1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
3 0
The ans is Phishing.!

You might be interested in
Como interactua el hardware de la computadora con el ser humano
soldi70 [24.7K]

Answer:

Los humanos interactúan con las computadoras a través de una interfaz de usuario

7 0
2 years ago
When you first open a word processor, you’ll find a ? document. A. filled B. blank C. edited
NikAS [45]
B, blank document is the answer
3 0
3 years ago
Read 2 more answers
How does the zone theory of optical systems resolve the apparent incompatibility of trichromacy and opponency?
lara [203]

Answer:

Money money money

Explanation:

4 0
3 years ago
Select the true statement about the motherboard.
Nata [24]

Answer:

it executes the commands sent to it by the applica software .

8 0
3 years ago
URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST
nika2105 [10]

Answer:

I'll happy to help

Explanation:

Please make your clear. I couldn't understand!

8 0
2 years ago
Read 2 more answers
Other questions:
  • In three to five sentences, describe how you can organize written information logically and sequentially
    8·1 answer
  • GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
    6·2 answers
  • In Python, arrays are usually reserved for
    12·1 answer
  • It is a small hand tool used generally in decorative works such as making garnishes
    15·1 answer
  • Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
    6·1 answer
  • AWT
    7·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
  • Difference between switch and switch lite
    10·1 answer
  • Select the correct technical term for each definition by using the drop-down menus.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!