1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
8

A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information

or grant unauthorized access to protected networks. A. direct mail B. instant messaging C. phishing D. spam E. mass mail
Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
5 0

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
You might be interested in
How to be fluent in computer
Setler79 [48]

Explanation:

1. Seeing people do technological innovations, so you have some motivation and inspiration to be fluent in computer

2. Try experimenting and trying stuff, like trying to learn how to code, how the internet work, etc.

3. work more with computers, for example, make a note with OneNote, making digital art with blender, adobe illustrator etc.

4. Try to learn how to be better at learning computer, like, if you do mistakes in your learning journey, try to avoid it next time

5. good luck ;)

7 0
3 years ago
Read 2 more answers
In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
abruzzese [7]

Answer:

The corrected code is as follows:

import java.util.Scanner;

public class U2_L4_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

String str1 = scan.nextLine();

String str2 = str1;

str1 = str1.toUpperCase();

System.out.println(str1);

System.out.println(str2);

}

}

Explanation:

This corrects the scanner object

Scanner scan = new Scanner(System.in);

This line is correct

String str1 = scan.nextLine();

This copies str1 to str2

String str2 = str1;

This converts str1 to upper case

str1 = str1.toUpperCase();

This prints str1

System.out.println(str1);

This prints str2

System.out.println(str2);

8 0
3 years ago
_______ make up the basic structure of a relational database with columns containing field data and rows containing record infor
Klio2033 [76]
QR codes make up the basic structure of a relational database with columns containing field data and rows containing record information.
3 0
4 years ago
Read 2 more answers
What does the term hardware refer to?
Jobisdone [24]

Answer:

The physical components that a computer is made of

Explanation:

as u can see these components and u can repaire these components if they got damaged

6 0
3 years ago
So this is what i use to code and all of that
givi [52]

Answer: yeah!

Explanation:

Have a good day!

5 0
3 years ago
Other questions:
  • How does microchip work
    12·1 answer
  • The manager of a sports club has data about the club members' ages in a workbook. He wants to find which age is most common. Whi
    13·2 answers
  • As a load is mechanically lifted, the materials ____________________.
    7·1 answer
  • What will be displayed as a result of executing the following code?
    5·1 answer
  • Anyone wanna play among us UwU code is TAEQPQ
    15·2 answers
  • Which of the following statements is true regarding the e-mails that were collected from Marina and Rita's Cupcakes' key employe
    11·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • Explain the look of a document which contains several different font sizes and font colors​
    13·1 answer
  • Global communication and transportation technologies are an example of a(n) ____
    8·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!