1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the

bank's database. However, she doesn't recognize the bank, because it is not one she does business with. What type of attack is she being presented with?
A. WhalingB. VishingC. PhishingD. Piggybacking
Computers and Technology
1 answer:
marshall27 [118]3 years ago
3 0

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

You might be interested in
List the five ethical rules that you feel are most important for one to follow when using the internet.
seropon [69]
1. Be smart
2. Do not tell anyone your personal info
3. Use reliable resources while looking up things (org,net,ect. no .coms)
4. ask your parents or guardian if you can go on a specific website And number 5 have fun!
7 0
3 years ago
Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25)
kvasek [131]

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

7 0
3 years ago
Briefly explain how an operating system may be described as an "interrupt-driven program." as system calls) from
Reptile [31]

Answer: Interrupt-driven program is defined as the program that permits to executes by stopping the execution of the currently running program.The completion of the program is indicated by the interrupt as a signal from assistant action .

Operating system is the system that carries out the functions and task of computer system.It has the major mechanism in which every alteration and changes are remarked such as state of hardware, event alteration, software component changes etc by the interrupt system.

Through interrupt system the operating system conducts new assignment and task for the compensation of changes that occurred in the system by halting the current working. Resources are invoked to fulfill the requirement of the work load.Thus, operating system can act in interrupt driven system's  manner.

7 0
3 years ago
What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for movi
mezya [45]

Answer:

Router        

Explanation:

  • A router is a network device that forwards data packets between networks. Its a network layer hardware device. For example a DSL router that connects to the Internet through an internet service provider.
  • Router is connects at least 2 networks (can be two LANs) and the ISP.
  • Router is used to transfer data from one network to another if both networks use same protocols.
  • It receives data in packets form and forwards the data to another router using a routing table. These data packets can be sent between devices or from devices to the internet.
  • The routing table is used to choose the optimal path for forwarding the packets between the source and destination hosts. Routing table configure the best route a packet can take to reach its destination using routing protocols. A Routing Protocol defines how routers connect with each other and share information that makes them choose routes on a computer network between source and destination. Routing tables can be configured statically (routes are fed manually) or dynamically (routes are updated based on information obtained  from other routers).
  • Router makes sure that the data packets reach right destination instead of being lost within the network and it also strengthen signals before transmitting them.
  • Routers reduce broadcast traffic. They form boundaries between broadcast domains and separate a network into multiple broadcast domains.
  • Router do not broadcast traffic and eliminates the packet when it detects a broadcast address. Routers also stop broadcast messages and don't route a broadcast message between broadcast domains.
6 0
3 years ago
I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
irina1246 [14]

Answer:

Slide selection

Title slide

Content wise slides

Little short animations

Conclusion slide

Thank you slide

Dont forget to use Times New Roman font as using this font makes people easier to understand the concept.

Give attractive headings

Give 2 minutes per each slide for explanation

Make this presentation very good with confidence and don't forget to include tactful facts

Dont get a panic attack Haha

4 0
3 years ago
Read 2 more answers
Other questions:
  • Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
    12·2 answers
  • The set of instructions that directs the computer to perform a variety of tasks is known as a
    9·1 answer
  • 40 points!!! Which of the following is a disadvantage of outsourcing?
    9·2 answers
  • Can someone please find the IP address of a 3630 hp printer?
    8·1 answer
  • It is important to know the terms of use of any website because why
    12·2 answers
  • (I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
    8·1 answer
  • I need simple app ideas for basic problems<br>​
    13·1 answer
  • 2. As you have learned, ironically, a large part of sound production involves visual perception. How easy or difficult did you f
    6·1 answer
  • Mario is designing a page layout for a sports magazine, and he decides to add the image of a cyclist. Which principle of page la
    10·1 answer
  • Frankie used the ps command to find the process id of an application that he needs to stop. What command-line tool should he use
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!