1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
10

Which of these is a type of social engineering attack?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
4 0

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

You might be interested in
You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of y
mafiozo [28]

Answer:

A cloud is a way of saying shared storage. Basically let's say you are in a classroom. Remember those cool projectors that projected a transparent drawn on sheet? it's like taking your picture and projecting it for all to see, but only for those individuals in the classroom. You can even lock the door to protect it(password protect) and only those with the key(password) get in!

Explanation:

You can use Google Drive

Microsoft Azure

OneDrive

Dropbox

many others.

7 0
4 years ago
During executing of the ______ PR task, units regain control of IP and transfer physical custody to the reintegration team.
Serggg [28]

Answer:

Support is the correct answer.

Explanation:

At the time of carrying out the task that supports the public relations task and regains the units that control the Internet protocol and transfer that custody which is physical for that team which is reintegration. IP is the address of the computer system or any other technology which is already assigned to it.

5 0
3 years ago
Database software lets the user sort information alphabetically, chronologically, or numerically. Which is NOT a commonly used d
vlabodo [156]
 it is a paradox .......... 
8 0
4 years ago
In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initi
svetlana [45]

Answer:

formatted

Explanation:

In order for storage devices to be prepared for use, they must be formatted.

7 0
3 years ago
Read 2 more answers
A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
sp2606 [1]
Bader Ali, IT101, from Ahmad Nasser where Bader Ali GPA=2.
3 0
4 years ago
Other questions:
  • Which statement correctly describe the FAFSA
    5·2 answers
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • Which of the following is the amount of space available on a screen to display information?
    8·1 answer
  • Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the
    9·1 answer
  • Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
    14·1 answer
  • Which entity has the principal responsibility to control the execution of processes?
    14·1 answer
  • Join zoom meet for time pass purpose <br><br>id=547 458 9345<br>pw=sencHURI​
    8·2 answers
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I
    8·1 answer
  • Displays information a bout drivers, network connections, and other program-related details.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!