1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
14

Which of the following describes the phishing method of information security crime?

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
5 0
The answer is C pretending to be someone else when asking for information
Marianna [84]3 years ago
3 0
<span>C. pretending to be someone else when asking for information</span>
You might be interested in
I need app ideas for basic everyday problems​
-BARSIC- [3]

Answer:

App that reminds you to drink water

Explanation:

A lot of people are dehydrated because they don't remeber to drink water

8 0
2 years ago
Most of the pollution in the ocean comes from:
pashok25 [27]
80% of the Pollution to the Marine Enviroment comes from Land. 
4 0
4 years ago
Why is time management considered a soft skill
FinnZ [79.3K]
This is due to the simple fact that time management helps you not only get things done for yourself, but also not get in the way of others and let them get things done for themselves. It's like working in harmony.

Hope this helps! <3
5 0
3 years ago
Read 2 more answers
Mary, Tim, John, and Jenn each sold three million dollars worth of product within six months. Each month one of them was awarded
photoshop1234 [79]

if its the same chart im looking at on this page, the answer is john.

5 0
3 years ago
Read 2 more answers
What kind of software consists of the programs that control or maintain the operations of a computer and its devices?
patriot [66]
Instructional coding hope this helps
6 0
3 years ago
Other questions:
  • How do humans feel about being abducted?
    12·2 answers
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Which of these is NOT an advantage of the impact of computer careers.
    9·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • Universal Containers is tracking the interviewer's ratings of candidate in Salesforce. They would like to easily link the Candid
    5·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Whats a hybrid wired network
    9·1 answer
  • Which type of document should Omar print?
    5·2 answers
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    14·1 answer
  • (b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!