1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
8

Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea

rch a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process.​What has happened to the customer computer?A. The client received a fake security alert.B. This is a real alert, and the client should call the number.C. Data is being stolen, and the client should disconnect from the network.D. The web browser has been hijacked by a virus.
Computers and Technology
1 answer:
Margaret [11]3 years ago
3 0

Answer:

A. The client received a fake security alert.

Explanation:

A fake security alert are fake error messages that used as a social engineering to display messages that will not go away. The aim of this fake error message is to trick the user into calling an indicated technical support hotline.

What has happened to this customer in this case is a fake security alert and should never call the phone number. The aim of the five minutes deadline is to trick the user to think that the case is very urgent so that the customer will rush to call the number.

You might be interested in
What are some activities that work especially well in Outline view? Check all that apply.
bogdanovich [222]

The answer should be A,D,E,and F

8 0
3 years ago
Read 2 more answers
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
lora16 [44]

<u>Uml (Unified Modified Language):</u>

In those days before software development normally we used flow chart, which will have Start, Process, Conditions and Stop, Modified version of flow chart is called UML (Unified Modified Language).

UML is standard model language which help develop understand flow of the software. Uml (Unified Modified Language).

There are 7 type of diagram is used in Uml (Unified Modified Language).

  • Class Diagram.
  • Object Diagram.
  • Component Diagram.
  • Composite Structure Diagram.
  • Deployment Diagram.
  • Package Diagram.
  • Profile Diagram.

I will suggest profile diagram and class diagram.

  • Profile diagram – This diagram is just to define use role and user rights.
  • Class diagram: - This diagram explains the class and their uses in the software development.
7 0
4 years ago
The first widely adopted windows product, ____, featured a standardized look and feel, similar to the one made popular by apple'
slega [8]
<span>The first widely adopted windows product, Windows 3, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer .
</span>
Microsoft’s Windows operating system was first introduced in 1985, Windows 3 which was released in 1990 was the first version to see more widespread success, because it had the ability to run MS-DOS programmes in windows which brought multitasking in programming.


8 0
4 years ago
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
True or False: You should only use your mirrors to see behind you when parallel parking.
mafiozo [28]
False. You should always look /check ou tall mirrors periodicly
8 0
3 years ago
Read 2 more answers
Other questions:
  • Trainers at Tom’s Athletic Club are encouraged to enroll new members. Write an application that allows Tom to enter the names of
    10·1 answer
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
    15·1 answer
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • Why would an information systems security practitioner want to see network traffic on both internal and external network traffic
    5·1 answer
  • The default print setting for worksheets is________
    13·1 answer
  • PI
    12·1 answer
  • Question 2 (6 points)
    11·1 answer
  • Draw a chart showing the crossing between red and white flowered pea plants till F2 generation. Find out the genotypic and pheno
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!