1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
13

Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati

on for her weekly reports through her web browser. You ask your boss, and he tells you that the server team changed the application's URL during an upgrade over the weekend. He asks you to make sure all the other technicians are aware of this change. What is the best way to share this information?
Computers and Technology
1 answer:
LekaFEV [45]3 years ago
5 0

Answer:

Update the knowledge base article that contains the application's URL in the call tracking application.

Explanation:

Robert did job in such a helpdesk, however, Kathy gets the call. Kathy states she seems to be no more able to control her weekly updates through the internet via her internet browser. A user asks his manager, then the manager informs him that following the update across the holiday, the network group modified that app's Link.  

So, He tells him to ensure that most of the current technicians have been aware. Then, he updates the base of knowledge report throughout the call monitoring framework which includes the app's link.

You might be interested in
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
1 year ago
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
Which program will have the output shown below?
Nutka1998 [239]

Answer: Python

Explanation: All I know is that the programming language is Python.

8 0
2 years ago
Read 2 more answers
Open source companies like Ethereum and Codius are enabling Smart Contracts using blockchain technology.
Olin [163]

Answer:

True

Explanation:

Ethereum uses Smart Contracts Blockchains and one of the programmers actually explained how it works at a DC Blockchain Summit.

3 0
3 years ago
Read 2 more answers
Paul is a baker who wants to improve his recipe for muffins because they turn out with a greasy flavor. What ingredient should h
Sergio039 [100]
Butter to Margarine

Cakes baked with butter usually always turns out to be greasy and heavy.

Hope this helps, good luck! (:
3 0
3 years ago
Read 2 more answers
Other questions:
  • Briefly describe "SoftwareEngineering Framework". Do provide examples and diagrams wherenecessary.
    15·1 answer
  • How do you delete text from a slide
    14·2 answers
  • Black Ops 3 For Ps4 Players Here
    7·1 answer
  • Does anyone know? If you do please answer.
    9·1 answer
  • An online journal or diary you create to share your thoughts, opinions and personal news is referred to
    13·1 answer
  • Help!!!
    8·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
  • In your opinion, who is the best Mine.Craft player overall?
    10·2 answers
  • Create a file using any word processing program or text editor. Write an application that displays the files, name, containing f
    8·1 answer
  • what uses gps tracking to track vehicles? group of answer choices edge matching. cartography. automatic vehicle location. geogra
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!