1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
12

Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f

ew days later, she found that her bank account had been emptied.
Which Internet security threat did she fall victim to?
Computers and Technology
2 answers:
Tcecarenko [31]3 years ago
6 0
Probably a phishing scam

asks for personal information claiming to be a person from a legitimate bank
ser-zykov [4K]3 years ago
4 0
The answer is:  "phishing" .
________________________________________
You might be interested in
Why would you set up a workbook to be shared if you are the only one using the workbook?
goldfiish [28.3K]

Answer:

b. You can track changes.

Explanation:

Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.

When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.

It makes a team to work simultaneously on the same workbook.

5 0
3 years ago
What are the benefits of building blocks?
BartSMP [9]

I'm not sure if this is what you're looking for but you can benefit from using the Building Blocks feature in Word. Building blocks are pieces of document content or pre-defined items, like tables, lists, headers, and text boxes. They can be used again and again in Word files on your computer.

Hope this helps

8 0
3 years ago
Read 2 more answers
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Which of the following scenarios describes an IT
slava [35]

Answer:

-checking social media networks during working hours

-surfing the Internet during working hours for what to do on the weekend

-downloading a favorite band’s latest album from a file-sharing service

Explanation:

they are all correct on edg.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What are the main differences between a workgroup and a domain?
    14·2 answers
  • Place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
    12·1 answer
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • The Marketing Department for CSM Tech Publishing is busy producing videos and print materials (stored in PDF format) for distrib
    6·1 answer
  • PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
    7·1 answer
  • When you are ready to print your document, what tab and command should you choose from the menu?
    11·2 answers
  • Select the four bad password ideas.
    13·2 answers
  • I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
    6·1 answer
  • AfcAAgrwdsgsFsefvzsdfvbjhbdjbbjbjsdndVHFadbhZJBVdb
    10·2 answers
  • Which example best demonstrates an impact of computers on the economy?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!