1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
10

Mha ship what yo fave

Computers and Technology
2 answers:
olga55 [171]3 years ago
5 0

Answer:

both of them are my fav

Explanation:

Diano4ka-milaya [45]3 years ago
4 0

Answer:

umm the first one I think..? lol

You might be interested in
The cord of a bow string drill was used for
goldfiish [28.3K]

Answer:

I don't remember much on this stuff but I think it was B

5 0
3 years ago
Which of the following is NOT an option in the comments group
IgorLugansk [536]
I need the options to help you out, thanks. :)
4 0
3 years ago
In general, what is the leftmost point of a circle with radius r centered at (x,y)?
Semmy [17]

The answer is (x-r, y).

5 0
3 years ago
The array index can be any nonnegative integer less than the array size.
suter [353]
I think the answer is true
7 0
3 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
1 year ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • If there are no differences between the amino acid sequences in the cytochrome c protein of humans and chimpanzees why aren't we
    15·1 answer
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • What tool enables you to easily delete, add, or resize filesystems without regard to their physical locations on a hard disk?
    13·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • _____ is the management function that monitors the performance of the firm and makes improvements when necessary
    15·1 answer
  • PLZ help
    5·1 answer
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!