1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
3 0
The ans is Phishing.!

You might be interested in
A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of
JulijaS [17]

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

8 0
3 years ago
Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol
KiRa [710]

Answer: Information MIS infrastructure

Explanation: Information MIS infrastructure is the company model that is used for supporting the task functioning . The main aim of this tool is to be used in backing -up , plan of diasater recovery and plan of business continuity.

These objectives are achieved by availability, portability , scalability , accessibility, maintainability etc characteristic. Francis is also involved in information MIS infrastructure by maintaining the payroll, records,history of employment  etc, securing the information,etc.

4 0
4 years ago
Amy would like to find all records that were delivered on August 8, 2008. Her database has a field that tracks when the items we
denpristay [2]
Conduct a query and set the criteria as = August 8, 2008. I'm not sure if this is the right answer, but that's what I think it is.
7 0
4 years ago
Read 2 more answers
A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosp
Zigmanuir [339]

Answer:

competitive

Explanation:

An inhibitor is a substance that hinders the action of an enzyme. An inhibitor may be competitive or non competitive.

A competitive inhibitor is an inhibitor that is very similar to the substrate hence it binds to the enzyme instead of the substrate. A noncompetitive inhibitor binds to a site that is different from the active site. This site is called an allosteric site.

If we look at the experiment described in the question, the reaction rate decreases upon addition of the inhibitor. This effect is reversed by adding a large quantity of substrate.

The implication of this observation is that the enzyme and the inhibitor compete for the active site on the substrate.

Hence the inhibitor is a competitive inhibitor.

7 0
3 years ago
Follow me please.........​
devlian [24]

thank you for the free points.

4 0
3 years ago
Other questions:
  • Which does a traditional camera need in order to capture images?
    13·1 answer
  • Juliet is trying to increase her savings account and she decides that she is going save an additional $700 every month. If her m
    9·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • "the magical number seven, plus or minus two" refers to the storage capacity of ________ memory.
    5·2 answers
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Who was the creator of the game Fnaf?
    11·2 answers
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • Difference between statement x=+5 and x+=5​
    7·1 answer
  • Who is the first computer programmer​
    14·2 answers
  • In designing a database, a database administrator should consider..
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!