1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
3 years ago
12

What method do phishing and spoofing scammers use

Computers and Technology
1 answer:
Leya [2.2K]3 years ago
8 0

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

You might be interested in
Can you please help me? I give you a brainlest <br>! ​
nlexa [21]
1.
2.satin stitch
3.lazy daisy stitch (detached chain )
4.chain stitch
5. cross stitch
6. french knot
7.
8.split stitch
9.
10. back stitch
the others i can’t tell.
4 0
3 years ago
Program _______ graphically present the detailed sequence of steps needed to solve a programming problem.
AlekseyPX

Program Pseudocode graphically present the detailed sequence of steps needed to solve a programming problem.

<h3>What are Pseudocode?</h3>

These are known to be a set of codes that a program has graphically depicted all of its sequence of steps that can be sued to handle a programming problem.

Note that Pseudocode is a form of artificial and man made informal language that is often used by programmers to create  algorithms.

Learn more about Program from

brainly.com/question/153827

#SPJ1

3 0
3 years ago
Computer security is the use of ____ security techniques to protect data stored on computers.a. physicalb. portc. ​logicald. ​en
Arte-miy333 [17]

Answer:

anti virus

Explanation:

3 0
4 years ago
"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"
lesya [120]

Answer:

The answer is "Five years (Two years)".

Explanation:

It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.

  • Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office.  
  • It also allows the phasing for the current map, that has been accepted.

3 0
3 years ago
After how many months should a tractor's steering fluid be changed?
matrenka [14]

Answer:

after every four months

Explanation:

3 0
3 years ago
Other questions:
  • A motor controller controls the and of the motors.
    9·1 answer
  • How you think the new values of your generation will affect economic decisions?
    11·1 answer
  • how to make assignment on power point plz cntct me and help me all about power point and my assignment is prime ministers of pak
    13·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • 9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
    5·1 answer
  • Which of these is an example of a mobile app?
    12·2 answers
  • ILL GIVE BRAINLIEST IMMEDIATELY PLEASE HELP
    10·2 answers
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
  • What is the difference between the dom api and the html dom api.
    8·1 answer
  • 9. Changing from a bystander to an advocate requires
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!