1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
13

Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work

and that they therefore need the user ID and password for her account. Tanya suspects that it is a phishing attempt. What should Tanya do next?
Computers and Technology
2 answers:
VARVARA [1.3K]3 years ago
5 0
She should report the email to her bank but don't enter any information
pashok25 [27]3 years ago
5 0

D. She should notify her bank..

You might be interested in
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information f
slava [35]

Answer:

C. NFC

Explanation:

NFC stands for Near Field Communication. NFC is been embedded in recent mobile device (ranging from phone to tablet) to ease payment. NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance.

From the option, Bluetooth look like a probable answer but when they are both compared; we realized that NFC has a shorter set-up time over bluetooth and is therefore faster than bluetooth.

3 0
2 years ago
The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
Llana [10]

Answer:

// Producer Thread

void *producer(void *param) {

buffer_item item;

while (true) {

item = rand() % 100;

sem_wait(&empty);

pthread_mutex_lock(&mutex);

if (insert_item(item))

printf("Can't insert item\n");

else

printf("Producer %d: produced %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&full);

}

}

// Consumer Thread

void *consumer(void *param) {

while (true) {

buffer_item item = NULL;

if (in > 0)

item = buffer[in - 1];

sem_wait(&full);

pthread_mutex_lock(&mutex);

if (remove_item(&item))

printf("Can't remove item\n");

else

printf("Consumer %d: consumed %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&empty);

}

}

Explanation:

An outline of the producer and consumer threads appears as shown above.

3 0
3 years ago
In a @return tag statement the description:
Bond [772]

Answer:

Option A is the correct choice answer for the above question.

Explanation:

The programming concept says that every function returns some value. If the return value is not defined by the user then the function returns the garbage value otherwise it returns the defined value by the user.

The return value is defined by the user with the help of the "return" statement and with the help of the following syntax-

return value; // The return statement.

Hence the option A is right because it satisfies the above concept while the other is not because--

  • Option B states that it must be longer than one line which is not correct.
  • Option C states that it cannot be longer than one line but this line does not make any sense about the returned statement.
  • Option D states that it describes the parameter value which is the wrong definition about the returned statement.
6 0
3 years ago
Read 2 more answers
12.
melisa1 [442]
The correct answer is 1.6
7 0
2 years ago
How are network computers different from traditional personal computers? describe some usage scenarios in which it is advantageo
Elanso [62]
A network computer depend on on a centralized computer for most of its services. It can consequently have a minimal operating system while a personal computer on the other hand has to be proficient of on condition that all of the required functionality in a detached manner without depending on a centralized manner. Scenarios where administrative costs are high and where sharing leads to more efficient use of resources are exactly those settings where network computers are preferred.
8 0
3 years ago
Other questions:
  • Which view In a presentation program displays you’re slides in full screen modes ?
    8·2 answers
  • To use a stored address, C provides us with an indirection operator, ____.
    6·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • 1. If this traffic signal is turned on after the red light, it means you may cross the intersection, but you _______ wait until
    12·2 answers
  • Which network component blocks status?
    9·1 answer
  • Which of the following statements is NOT true about url extension?
    10·2 answers
  • Write if true or false
    12·1 answer
  • Suppression of politically or socially unacceptable co
    5·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!