1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
10

Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa

l is to convince the recipient into submitting personal information, such as passwords or bank account numbers.
Question 9 options:
True
False
Computers and Technology
2 answers:
never [62]3 years ago
5 0

Answer:

this is true

Explanation:

the answer is true

insens350 [35]3 years ago
3 0
The answer is true .
You might be interested in
1. Write Python code to implement the following:
ZanzabumX [31]

Answer: no why huh hmmmmmmm

Explanation:

6 0
2 years ago
Read 2 more answers
What is word processing in excel
Flura [38]

Answer:

Microsoft Excel and Microsoft word are the part of the MicrosoftOffice Package of productvity software.

5 0
3 years ago
In brainly.com which is best answerer​
mote1985 [20]

Explanation:

I don't know, because I had only spent one month in brainly. but I think it is Mister 360. s/he is a great answerer and always stay at top in leaderboard.

5 0
3 years ago
A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw
svetoff [14.1K]

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

7 0
3 years ago
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
Thepotemich [5.8K]

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
    13·2 answers
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • A parent is browsing through a shopping website, looking for blue-colored striped socks for her child. She is fine if the socks
    15·1 answer
  • A server, also called a(n) _______________, operating system is a multiuser operating system because it controls a central compu
    6·1 answer
  • Study the sentences below. A.Changing the properties of characters in a sentence or paragraph in a Word document helps increase
    5·2 answers
  • What is the unit used to describe the intensity of sound?
    5·1 answer
  • Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
    13·1 answer
  • The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp
    11·1 answer
  • This feature automatically creates tables of contents.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!