1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
15

One of the prominent movies released in the 1950s is

Computers and Technology
2 answers:
MrRa [10]3 years ago
3 0
Vertigo was the #1 movie of that time
Alex787 [66]3 years ago
3 0

Answer:

yes,  virtigo was first prominent movies released in 1950s

You might be interested in
What is the maximum number of columns in a spreadsheet that you can sort in one instance in software like OpenOffice Calc?
MakcuM [25]
The correct answer is D
6 0
3 years ago
Read 2 more answers
What are some tasks Petroleum Engineers perform?
tresset_1 [31]
They mostly revolve of production of gas and oil.When a new reservoir is located,the engineers analyze it to determine if it can be exploited with profit.If so they create a drilling and extraction plan to pump out gas or oil as little as possible.
5 0
3 years ago
Read 2 more answers
Why do we have to watch a video to get answers?
IRINA_888 [86]

Answer:

The videos contain the answers.

Explanation:

4 0
3 years ago
Read 2 more answers
Jenna received an interesting email about dolphins that she wants to share with her brother. Which operation will allow Jenna to
KATRIN_1 [288]
The answer is Forward

5 0
3 years ago
Users on your network report that they have received an email stating that the company has just launched a new website. The emai
e-lub [12.9K]

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

7 0
2 years ago
Other questions:
  • What is security in Technology<br>​
    8·2 answers
  • Windows Live SkyDrive is an example of _____ storage.
    13·1 answer
  • What would you recommend for data segregation if using cloud software
    12·2 answers
  • PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin
    5·1 answer
  • Which PlayStation was the first to allow connection between it and computer network
    12·1 answer
  • 12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the
    8·1 answer
  • When the tv was created (year)
    14·2 answers
  • Documental acerca de los principales materiales que se emplean en la fabricación de medios técnicos utilizados en una oficina.
    9·1 answer
  • Which term refers to the use of the internet at work for personal use?.
    12·1 answer
  • Retype the below code. Fix the indentation as necessary to make the program work.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!