1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the

bank's database. However, she doesn't recognize the bank, because it is not one she does business with. What type of attack is she being presented with?
A. WhalingB. VishingC. PhishingD. Piggybacking
Computers and Technology
1 answer:
marshall27 [118]3 years ago
3 0

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

You might be interested in
You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values.
Alex787 [66]

Answer:

There are multiple critical paths

Explanation:

The critical path method (CPM), or critical path analysis (CPA), is an algorithm for scheduling a set of project activities. It is commonly used in conjunction with the program evaluation and review technique (PERT). A critical path is determined by identifying the longest stretch of dependent activities and measuring the time required to complete them from start to finish.

The essential technique for using CPM is to construct a model of the project that includes the following:

  •    A list of all activities required to complete the project (typically categorized within a work breakdown structure),
  •    The time (duration) that each activity will take to complete,
  •    The dependencies between the activities and,
  •    Logical end points such as milestones or deliverable items.      

Using these values, CPM calculates the longest path of planned activities to logical end points or to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are "critical" (i.e., on the longest path) and which have "total float" (i.e., can be delayed without making the project longer).

considering the above function of the cpm analysis because you have multiple path, there is tendency that more than path through the project network will have zero slack values.

5 0
3 years ago
If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
balandron [24]
You will type

400*2*1.5

1.5 is another way to say 1 1/2
4 0
4 years ago
Read 2 more answers
Among object-oriented languages, one feature that varies considerably is whether the language allows multiple inheritance. C++ d
Amiraneli [1.4K]

Multiple inheritance causes Diamond problem which happens when:

Class A is parent of class B and C

Now when class D will be inherited from both Class B and C it will have all the members of class A and B which if same will confuse the compiler to import which one?

C++ solves it by using virtual keyword with them and thus telling the compiler which one to inherit.

Java has introduced the interface concept rather then allowing multiple inheritance.

4 0
3 years ago
g Create a program that reads a list of states from an input file, puts them in order, and displays the sorted list to the user.
mixas84 [53]

Answer:

Check the explanation

Explanation:

# Step 1

the first thing to execute will be......

f = open("states.txt")

# Step 2

the second step is......

states = []

for line in f:

   states.append(line.strip())

# Step 3:

the third step is to......

for state in sorted(states):

   print(state)

f.close()

3 0
3 years ago
One or more messages about the same topic is a ?
elena55 [62]

Answer:

This is the case of redundancy or the repeated data. It means that the same data is being repeated again and again. And its the wastage of time and memory both. The redundancy must be removed in all circumstances. However, we cannot as without it proper normalization of data is not possible.

Explanation:

The answer is self explanatory.

6 0
3 years ago
Other questions:
  • In Microsoft Word, how would you change the amount of space that is put in after each paragraph?
    15·1 answer
  • A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices.
    13·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
    12·1 answer
  • Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order
    14·1 answer
  • What is Roko's Basilisk?
    7·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
  • 2. Which of the following is a shortcut key to Exit from any operation?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!