1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
14

Which of the following describes the phishing method of information security crime?

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
5 0
The answer is C pretending to be someone else when asking for information
Marianna [84]3 years ago
3 0
<span>C. pretending to be someone else when asking for information</span>
You might be interested in
Write a short note on Computer<br>impact on<br> our society?​
Vesna [10]

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

8 0
2 years ago
Read 2 more answers
Iciples UI
Dmitriy789 [7]

Answer:A

Explanation: I took the test !

8 0
3 years ago
Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
Verdich [7]

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

8 0
3 years ago
Describe the procedure for creating a table or spreadsheet in a presentation slide.
brilliants [131]
<span>Select the slide that you want to insert a table on.On the Insert tab, in the Tables group, click Table, and then click Excel Spreadsheet.<span>To add text to a table cell, click the cell, and then enter your text</span></span>
5 0
3 years ago
The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
STatiana [176]

Answer:

Bandwidth

Explanation:

Bandwidth is the rate of transfer of data in the given time. Its unit is Bit/sec.

It is used to measure the transfer rate of bit in a network.

4 0
3 years ago
Other questions:
  • 1).
    12·1 answer
  • Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group. a. IEEE b. ITIL c. N
    9·2 answers
  • What is the purpose of filters in a data base
    11·1 answer
  • The use of electronic media, information, and communication technologies to deliver instruction where students are not required
    8·1 answer
  • Insert a row above the selected row (in between row 1 and row 2).
    15·2 answers
  • Advantages of heading attributes
    5·1 answer
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • Int value[10] = {1, -7, 95, 123, 80, 67, -30, 17, 152, 121} ;
    12·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!