1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
10

Which of these is a type of social engineering attack?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
4 0

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

You might be interested in
¿porque y como surge la informatica y las computadoras
LekaFEV [45]

Answer: La informática es el futuro: un puente hacia todas las cosas útiles.

La informática aprovecha el poder y la posibilidad de la tecnología digital para transformar datos e información en conocimiento que la gente usa todos los días. Este fuerte enfoque en el uso humano de la informática ayuda a las personas a interactuar con la tecnología de la mejor y más eficiente manera posible.

Explanation:

8 0
3 years ago
1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
ale4655 [162]

Answer:

1.Mobile devices have a meta tag viewport that displays a web page content that fits within a mobile screen.

2.  A common technique for mobile websites is to hide navigation menus but to indicate their presence with a(n) hamburger, which is a symbol usually represented as three horizontal lines.​

Explanation:

  • Viewport is defined as a display screen size for websites. Before mobile phones and tablets all the websites were created with fixed  dimensions for screen display. But with the need of android, they were upgraded so that the websites fit themselves automatically on to the screen using a <meta> tag viewport.
  • Hamburger is a icon that leads to the list of different functions of a website or app. They mostly are used in android systems to give a compact view so that navigation menus could be hidden. The icon has a symbol of three horizontal lines one above the other.

I hope it will help you!

8 0
3 years ago
The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
zlopas [31]

Answer: True

Explanation:

The definition of minimum spanning tree(MST) says that the graph must be connected and undirected to be considered for MST. It has (V-1) edges where V is the number of vertices. The minimum spanning tree is implemented using Kruskal's algorithm whereby it starts by considering the minimum weighted edge and covers all the edges upto (V-1) edges. So for MST it has to be connected

3 0
3 years ago
Harold wants to create a design that would depict the innocent and evil sides of human nature. Which colors can Harold use to de
belka [17]

Answer:

Usually good and evil are depicted as black and white or red and white. White being good, or pure.

Explanation:

8 0
3 years ago
Identifying what you will need to review takes place during?
marishachu [46]
It takes places during surveying.

For example, let's say you want to review your own produced game application software, and found out whether it satisfy your consumer or not

Before you conduct the survey, you have to identify what aspect you want to find out from your consumers , such as : Does it have any bug ? Is it challenging enough ? is the graphic good enough ? etc
7 0
3 years ago
Read 2 more answers
Other questions:
  • Clip art, by default, is formatted as a(n) ____, which cannot be moved to a precise location on a page.
    14·1 answer
  • Dr. Patterson’s office calls to give patient Sara Martin her test results from her most recent visit. Her husband answers the ph
    8·2 answers
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • Does anyone know this page for drivers ed?
    9·1 answer
  • 1. What are the built-in operations on classes?
    8·1 answer
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • What is the difference between = and == in terms of java..?
    6·2 answers
  • What methods would you add to make this class declarationvery useful?
    11·2 answers
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Reading (BCK FORM 2C IT 2020-2021)
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!