1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
4 years ago
13

Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work

and that they therefore need the user ID and password for her account. Tanya suspects that it is a phishing attempt. What should Tanya do next?
Computers and Technology
2 answers:
VARVARA [1.3K]4 years ago
5 0
She should report the email to her bank but don't enter any information
pashok25 [27]4 years ago
5 0

D. She should notify her bank..

You might be interested in
Uses computer resources from multiple locations to solve a common problem.
Lynna [10]

Answer:

Distributed Computing is used to solve common problem from multiple locations at different locations.

Explanation:

It is the architecture of processor, that is used to combine the different resources of computer from different domain to solve the common problem.

It allows us resource sharing such as hardware and software that are connected to the computer.

Examples

Following are the examples of Distributed computing.

  1. Telecommunication Network
  2. sensor network
  3. banking network

8 0
4 years ago
In windows 10, what is the name of a program you can use to find a file or folder?
Anna007 [38]

Answer:

windows search explorer

3 0
3 years ago
Which was the first computer brought in nepal?<br>​
Natasha_Volkova [10]

Answer:

the first conputer brought in nepal was IBM 1401

3 0
3 years ago
Read 2 more answers
From the given programs and application given above, choose one that you prefer to use in making a computer-generated art and wh
nata0808 [166]
More information is needed to answer this question
4 0
3 years ago
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Other questions:
  • _____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
    9·1 answer
  • Consider the concept of cultural lag. Identify two American values that are “lagging.” What are three norms that are lagging? Ho
    11·1 answer
  • What type of cable is used to connect a workstation serial port to a cisco router console port?
    15·1 answer
  • What was the process called that required the photographer to have a tent or darkroom handy so that chemicals could be mixed qui
    7·1 answer
  • What is the full from of CPU?​
    5·2 answers
  • ¿ cuales son las características de revolución industrial?
    11·1 answer
  • IF U LOVE CODING CLICK HERE!!! : )
    14·1 answer
  • What explains the discrepancy between the number of bytes you can
    13·1 answer
  • How many channels can the 2.4 GHz band be divided into?
    12·1 answer
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!