1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
10

Which of these is a type of social engineering attack?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
4 0

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

You might be interested in
5. What is a domain name used for?​
Mnenie [13.5K]

<u>Answer:</u>

Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols. A domain name may represent entire collections of such resources or individual instances.

<u />

<u>Explanation:</u>

*Hope this helps*

7 0
3 years ago
Which part of project management involves determining possible risks?
stira [4]
Resources :) You’re welcome
7 0
2 years ago
Read 2 more answers
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
Naily [24]

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

8 0
3 years ago
Information about a computer file, not the actual data that is contained in the file, is called ______
dangina [55]
Bytes, metadata, storage, documents are what come to mind without know the specifics. Sorry, Hope this helps.
5 0
3 years ago
Read 2 more answers
which software application offers a variety of templates for creating reports, flyers and newsletters that you can access within
sp2606 [1]
Presentation Softwares
4 0
3 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • An effective team would never have​
    9·1 answer
  • ________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
    6·1 answer
  • The exercise instructions here are long -- please read them all carefully. If you see an internal scrollbar to the right of thes
    15·1 answer
  • What is the output <br>this is a computer science question ​
    8·1 answer
  • How do you award a brainliest
    8·2 answers
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • Fill in the blanks Pasaline could ----- and ------- very easily.​
    8·1 answer
  • Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!