1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
10

Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa

l is to convince the recipient into submitting personal information, such as passwords or bank account numbers.
Question 9 options:
True
False
Computers and Technology
2 answers:
never [62]3 years ago
5 0

Answer:

this is true

Explanation:

the answer is true

insens350 [35]3 years ago
3 0
The answer is true .
You might be interested in
The numeric keys on a keyboard or calculator are referred to as a:
Anna [14]

Numeric Keypad is the answer

6 0
3 years ago
Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software
Scilla [17]

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

6 0
3 years ago
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wan
zhuklara [117]

Answer:

entities

Explanation:

3 0
3 years ago
Consider the following program. Assume all variables are declared and the program compiles.
Alexus [3.1K]
Hard question thx for the points give me brainlest points plz
8 0
3 years ago
Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. D
liberstina [14]

Answer:

You could type<em> ipconfig www.cnn</em> in command promt.

Explanation:

4 0
2 years ago
Other questions:
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Once a software program has been through one test cycle performed by the programmers and is running proper
    10·1 answer
  • What is the most important for you to choose before you build a network?
    7·1 answer
  • Discuss the main characteristics of the database approach and how it differs from traditional file systems.
    14·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • 2. Kabel yang digunakan pada jangan wireline, sebagai
    14·1 answer
  • What software is my teacher using to do this and how can i stop her from doing this
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!