1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
14

Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at

tacks.
Replying to an e-mail requesting your user ID and password Phishing victim Not a phishing victim
Computers and Technology
1 answer:
Zepler [3.9K]3 years ago
4 0

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

You might be interested in
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Scorpion4ik [409]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
7 0
4 years ago
Is anyone good with auto Cad?
nydimaria [60]
Yes,I am very good with auto Cad
3 0
3 years ago
Computers store all characters as numbers stored as binary data. Each instruction or symbol gets a bit string assignment. The st
juin [17]

Answer:

0 and 1

Explanation:

Please mark brainliest

7 0
3 years ago
What has been your background with using Windows-based computers?
Radda [10]

Answer:

Anything i desire.

Explanation:

4 0
3 years ago
Read 2 more answers
Select the correct answer.
alexandr1967 [171]

Answer:

A. Sequential

Explanation:

As the page and the presentation goes on, the author will put it in that order or link it to a small number such as ²

4 0
3 years ago
Read 2 more answers
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    8·1 answer
  • Why is RAM used for temporary storage!
    6·1 answer
  • Assume that aList is a valid ArrayList containing the following:
    8·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • Do you think technology and social media have made it easier or more difficult to make connections and find a job? Explain.
    12·1 answer
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • The Task Manager can be used ot track running _________________ .
    11·1 answer
  • A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
    8·1 answer
  • Why is my Brainly scanner not work​
    5·2 answers
  • How are online sources used? Check all that apply.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!