1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
3 0
The ans is Phishing.!

You might be interested in
How do you add Rulers to a document?: *
swat32

Answer:

a. click on View, then ruler

Explanation:

If you want to add ruler to the document following is the procedure to do it:

Click on View.

Then check the ruler in the group called show.

You will get the ruler in your document.You can also remove it by unchecking the ruler box.

Ruler is used to measure and line up objects.

Hence the answer to this question is option A.

4 0
3 years ago
What is the advantage of using the Publish Online option for sharing a calendar? It creates a web version that can be viewed by
kotykmax [81]

Answer:

its D. it allows a user outside an organization to view the calendar.

Explanation:

i just got it right on edge 2020.

7 0
2 years ago
Read 2 more answers
Each type of text has a purpose for the reader if you were looking to research penguins what type of text would u utilize
dlinn [17]
1. ughhhh not entirely sure but B, 2. again not entirely sure should be B as well and finally 3.is D remember these are not always the answer just most likely what one person thinks
3 0
3 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
Please help I have errors codes and don’t know that they are.<br> Please help thank You.
gizmo_the_mogwai [7]
Refresh, power off and repeat
4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is not a network connection LAN WAN SAN MAN
    6·1 answer
  • It is not possible to convert a numbered list to a bulleted list in Word 2007. T or F
    13·1 answer
  • Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use
    11·1 answer
  • Which of the following is NOT a function of the Web Accessibility Initiative​ (WAI)? A. Offering links to a variety of software
    10·1 answer
  • A=1/2h(a+b) solve for h
    6·1 answer
  • What are the network topologies? Advantages and disadvantages.
    9·1 answer
  • You are planning to write a guessing game program where the user will guess an integer between one and 20. Put the commented ste
    12·1 answer
  • What statement best describes entrepreneurship?
    7·2 answers
  • Can anyone suggest me any good complete isekai anime..​
    14·2 answers
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!