1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
12

Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f

ew days later, she found that her bank account had been emptied.
Which Internet security threat did she fall victim to?
Computers and Technology
2 answers:
Tcecarenko [31]3 years ago
6 0
Probably a phishing scam

asks for personal information claiming to be a person from a legitimate bank
ser-zykov [4K]3 years ago
4 0
The answer is:  "phishing" .
________________________________________
You might be interested in
You must. place a child in a federally approved child restraint device. if the child is
abruzzese [7]
You must place a child in a federally approved child restraint device if the child is three years and under. 
5 0
3 years ago
Read 2 more answers
what are the three parts to physical security standards for various types of army equipment and the risk level
zzz [600]

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

<h3>Further explanation</h3>

Physical security is the part of security concerned with physical measures designed to protect the assets and facilities of the organization.  

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

Access control is a security technique in which regulates who/what can view/use resources in a computing environment. The example of physical access control is the locks, badge system, and security guard.

Surveillance is the condition in which the architects seek to build spaces that are more open to security personnel and authorized users. It is also the continuous monitoring of, for example, the disease occurrence. The example of surveillance is Closed-circuit television cameras (CCTV) placed in the streets.

Security testing is the evaluation and testing the information security of hardware, software, networks, and IT environment. Error handling and specific risky functionalities are examples of security testing

<h3>Learn more</h3>

1. Learn more about the security practice in electronic banking brainly.com/question/7668763

 

<h3>Answer details</h3>

Grade:  9

Subject: Computers and Technology

Chapter:  Physical security standards

Keywords:  physical security, access control, surveillance, security testing

3 0
3 years ago
What is an abstract class? (Points : 2) A generalized class used only to create related derived classes
Sphinxa [80]

Answer:

A generalized class used only to create related derived classes

Explanation:

An abstract class is a class which cannot be instantiated on its own. It is defined using an abstract keyword. However, an abstract class can be inherited from and the derived class can actually be instantiated. For example:

abstract class A{

}

class B extends A{

void test(){

}

}

Here class A is an abstract class, while class B inherits from A. Now we can create an instance of class B as follows:

B b = new B();

b.test();

8 0
3 years ago
Yo, what's the tinyclick.ml/7hTq link?? I don't trust it, but I'm curious-
Rashid [163]
<h2>Answer:</h2>

<u><em>Usually, random people will say that on your questions page to give you a virus but then that link doesn't look like the same link I see every day. I would still not click it just in case.</em></u>

<h2>Explanation:</h2>

<em>Have a good one!</em>

<h2>( ◑‿◑)ɔ┏--┑٩(^◡^ )</h2>
5 0
3 years ago
What types of files are saved with the mp3 and zip extensions
Tanya [424]

Mp3 files are audio files and zip extentions are compressed files so they take up less space

4 0
4 years ago
Other questions:
  • A document repository is down when you attempt to access it. which isa principle is being violated?
    13·1 answer
  • A network manager prevents users accessing certain websites. She does this by setting up:
    7·1 answer
  • Would a hurricane form if the humidity is really high and the breeze is very low
    11·1 answer
  • Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator&amp; calculate_wages(double hours, double wage
    8·1 answer
  • Revisa un manual o instructivo de las maquinas o aparatos tecnologicos que tengas en tu casa. Luego, trata de encontrar algunas
    9·1 answer
  • How does Map Put function work in Java? *
    12·1 answer
  • The second purpose of government regulation is to​ _____________________.
    8·2 answers
  • For robot arms the first three axes are called
    6·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!