Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
11. is battle of the bulge
12. rationing
13. trade embargo act
14. germany won the battle is not true
15. force jews to wear stars sown to their clothing to be caught without was punishable by death
A composite primary key applies to more than one field. <span>A table can have only one primary key, which may consist of single or multiple fields.</span>
A composite primary key is selected from Design view. <span>In Design </span>view<span>, you can use the </span>Primary Key<span> button to assign or remove the </span>primary key<span> designation for the </span>selected<span> field or fields.</span>
Answer:
WiMax
Explanation:
Wimax is a family standards of a communication of bandwidth, this is a standard IEEE 802.16, was created to provide data velocity like 30 or 40 megabits per seconds, but in 2011 was updated, and now can provide 1 gigabit per second, the name WiMAX is for a forum created in 2001 to promote the standard.
The question above has multiple choices as
follows;
a. Internet
<span>
b. Intranet
<span>
c. Extranet
<span>
d. World Wide Web
Correct answer is
C. Extranet
<span>You are able to use an Extranet to securely
share part of a business’s operation with vendors, suppliers, customers, partners
or any other business organization. We
can also view an extranet as an intranet extended to users outside the company.</span>
</span></span></span>