1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
14

Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens

it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.​
Computers and Technology
1 answer:
Angelina_Jolie [31]3 years ago
5 0

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
You might be interested in
Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.
sasho [114]

Answer:

P_{10} =0.1

Explanation:

Given

0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8

Required

Determine P_{10}

P_{10} implies 10th percentile and this is calculated as thus

P_{10} = \frac{10(n+1)}{100}

Where n is the number of data; n = 14

P_{10} = \frac{10(n+1)}{100}

Substitute 14 for n

P_{10} = \frac{10(14+1)}{100}

P_{10} = \frac{10(15)}{100}

Open the bracket

P_{10} = \frac{10 * 15}{100}

P_{10} = \frac{150}{100}

P_{10} = 1.5th\ item

This means that the 1.5th item is P_{10}

And this falls between the 1st and 2nd item and is calculated as thus;

P_{10} = 1.5th\ item

Express 1.5 as 1 + 0.5

P_{10} = (1 +0.5)\ th\ item

P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item

From the given data; 1st\ item = 0.1 and 2nd\ item = 0.1

P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item becomes

P_{10} =0.1 +0.5(0.1 - 0.1)

P_{10} =0.1 +0.5(0)

P_{10} =0.1 +0

P_{10} =0.1

3 0
3 years ago
A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slo
krok68 [10]

Answer:

The answer is below

Explanation:

Given that:

Frame transmission time (X) = 40 ms

Requests = 50 requests/sec, Therefore the arrival rate for frame (G) = 50 request * 40 ms = 2 request

a) Probability that there is success on the first attempt = e^{-G}G^k but k = 0, therefore Probability that there is success on the first attempt = e^{-G}=e^{-2}=0.135

b) probability of exactly k collisions and then a success = P(collisions in k attempts) × P(success in k+1 attempt)

P(collisions in k attempts) = [1-Probability that there is success on the first attempt]^k = [1-e^{-G}]^k=[1-0.135]^k=0.865^k

P(success in k+1 attempt) = e^{-G}=e^{-2}=0.135

Probability of exactly k collisions and then a success = 0.865^k0.135

c) Expected number of transmission attempts needed = probability of success in k transmission = e^{G}=e^{2}=7.389

6 0
4 years ago
What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
Blizzard [7]

Answer:

Input

Processing

Output

Explanation:

6 0
3 years ago
Which type of data is most sensitive and should be protected from malware?
Dennis_Churaev [7]
The correct answer is “C. The credit card number that you use to make an online purchase”
5 0
2 years ago
Which of the following is part of the 6-by-6 rule?<br><br> i need help!!!!!
Digiron [165]
No more than six lines, and no more than six words in a 6 by 6 rule.
5 0
3 years ago
Other questions:
  • What is this I’m so lost
    9·1 answer
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking n
    6·1 answer
  • Part 2: Code the Program
    12·1 answer
  • If any one answered this i will give brilientst what is stimulation program​
    6·1 answer
  • Have some points part 6<br>anyone know how to change my username?​
    11·2 answers
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPLICATION SOFTWARES.
    5·2 answers
  • I want to start a debate about something
    9·2 answers
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!