1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
13

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down

Berryhill's website unless Ashley wired payment to an overseas account. Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down, so she wired money to the appropriate account. The author of the e-mail successfully committed
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
7 0

Answer:

cyber-extortion

Explanation:

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account. Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down, so she wired money to the appropriate account. The author of the e-mail successfully committed cyber-extortion.

You might be interested in
What will be displayed if code corresponding to the following pseudocode is executed? Set Number = 4 Repeat Write 2 * Number Set
Elis [28]

Answer:

8

12

Explanation:

I made the code a bit easier to understand then worked out how it would go. Here's what I did.

number = 4

repeat until number = 8:

   write 2 * number

   number = number + 2

Following this itenary, we have, the system first writes "8" as it multipled 4 by 2. Number is now equal to 6.

Next repetition, the system writes "12" as it multipled 6 by 2. Now, number = 8. The proccess now stops as number is now equal to 8.

5 0
3 years ago
What does the dashed line in the beaker separating the two sides represent?______________________?
kodGreya [7K]

I guess the correct answer is A membrane

A mеmbranе is a sеlеctivе barriеr; it allοws sοmе things tο pass thrοugh but stοps οthеrs. Such things may bе mοlеculеs, iοns, οr οthеr small particlеs.

7 0
3 years ago
Read 2 more answers
Traffic shaping reduces traffic by ________. preventing certain undesirable traffic from entering the network limiting the amoun
Lera25 [3.4K]

Answer:

Explanation:

Traffic Shaping is a technique for managing congestion on a network by delaying the flow of less important/desired packets on the network so more valuable/desirables ones are able to pass. Traffic shaping reduces traffic by preventing certain undesirable traffic from entering the network as well as limiting the amount of certain undesirable traffic entering the network.

5 0
3 years ago
Software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common serv
Anit [1.1K]
Probably an Operating System like Mac, Linux, or Windows. There may be a type of downloadable software to do this, but may be debatably safe.
5 0
3 years ago
The major result of treating 1-butyne with 6M aqueous NaOH would be:_______.A. the production of an alkene.B. the production of
andriy [413]

Answer:

D. nothing, as the alkyne would not react to an appreciable extent.

Explanation:

Nothing, as the alkyne would not react to an appreciable extent.

6 0
3 years ago
Other questions:
  • Where is the error in this code sequence?
    11·1 answer
  • )Dynamically allocate an object of Banana, using the pointer variable daco.
    6·1 answer
  • How do you create a logo on Adobe illustrator
    8·1 answer
  • When it comes to collecting and organizing prospect and account​ information, salespeople have a large variety of computer syste
    15·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • The _____ provides a basis for creating the project schedule and performing earned value management for measuring and forecastin
    6·1 answer
  • What is an elliptic curve cryptosystem (ECC)?
    8·1 answer
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • What types of things were often NOT captured in early photographs?
    7·1 answer
  • Does anyone know what this logo is??
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!