1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the

bank's database. However, she doesn't recognize the bank, because it is not one she does business with. What type of attack is she being presented with?
A. WhalingB. VishingC. PhishingD. Piggybacking
Computers and Technology
1 answer:
marshall27 [118]3 years ago
3 0

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

You might be interested in
Now you are ready to implement a spell checker by using or quadratic. Given a document, your program should output all of the co
Harlamova29_29 [7]

Answer:

Sorry po idont know po ehhh sorry

5 0
3 years ago
Shaniya has misspelled a scientific name in her biology report. She needs to correct it, but she has no access to a computer. Sh
Sav [38]

Answer:

Selection of answers:

Yes, she can navigate the window and do simple editing.

Yes, she can use this application for free and navigate the window.

No, her document is “Read-Only,” so she cannot navigate the window.

No, her application has limited features and she cannot access the document.

Answer is: No, her document is “Read-Only,” so she cannot navigate the window.

3 0
3 years ago
The filter feature in excel allows you to look at what Data?
madam [21]

For applying the filter you need to select the data on which you want to apply it so it will allow you to look at only data you select from the filter options.

4 0
3 years ago
In many DBMSs where no strict separation of levels is maintained, this one language is used by the DBA and database designers to
marissa [1.9K]

Answer: False

Explanation:

This means that the mappings between the two schemas may be specified in either one of these languages.In most relational DBMSs today, there is no specific language that performs the role of SDL. Instead, the internal schema is specified by a combination of functions, parameters, and specifications related to storage. These permit the DBA staff to control indexing choices and mapping of data to storage

5 0
3 years ago
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses
iris [78.8K]

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

4 0
3 years ago
Other questions:
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are
    7·1 answer
  • How has information technology made piracy possible
    14·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • Five plus six is equal to?​
    10·2 answers
  • El botón de layout se usa para <br>​
    8·1 answer
  • Topic: Video Games.
    7·1 answer
  • Identify the calculation performed by the following code.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!