Answer:
A. Spoofing
Explanation:
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.
Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take
Answer: See explanation
Explanation:
The procedure fur responding to an email message goes thus:
The first thing to do is to open the website of the email. Then, you would click on "compose".
When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.
Then you type the content of your message. When you're done with this, then you click on send.
```
<ul>
<li>item1</li>
<li>item2</li>
</ul>
```
It's the same for ol.
Answer:
the teacher said a (dash) reads pages on website pls answer me now i have to write it now
Answer:
the answer would be there
Explanation: