1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
13

Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work

and that they therefore need the user ID and password for her account. Tanya suspects that it is a phishing attempt. What should Tanya do next?
Computers and Technology
2 answers:
VARVARA [1.3K]3 years ago
5 0
She should report the email to her bank but don't enter any information
pashok25 [27]3 years ago
5 0

D. She should notify her bank..

You might be interested in
How can you protect your information when using wireless technology
Mnenie [13.5K]

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

8 0
2 years ago
Focusing on the general characteristics of a problem or object, while ignoring the details, is a technique called
Taya2010 [7]

Answer:

Abstraction

Explanation:

In computer science, abstraction has a similar definition. It is a simplified version of something technical, such as a function or an object in a program. The goal of "abstracting" data is to reduce complexity by removing unnecessary information. At some level, we all think of computers in abstract terms.

5 0
3 years ago
Which type of electromagnetic wave do cell phones send and receive.
Slav-nsk [51]
?? it should be radio waves but i guess the next best thing is microwaves
4 0
3 years ago
Read 2 more answers
List five things that could cause premature bearing failure
Wewaii [24]
Smoking, Drinking, Use of drugs, problems with uterus, Problems with cervix or placenta.


6 0
3 years ago
Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't w
Alona [7]

Explanation:

Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.

Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.

6 0
3 years ago
Other questions:
  • Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a
    12·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
    9·1 answer
  • A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a
    10·2 answers
  • What is your favourite video game??​
    5·2 answers
  • Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without lif
    10·1 answer
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • 3. The following is a dump of a UDP header in hexadecimal format. 0045DF000058FE20 a. What is the source port number? b. What is
    15·1 answer
  • Which of the following best describes contextual design?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!