1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
3 years ago
8

Which of the following is an example of phishing attack? csp

Computers and Technology
1 answer:
TEA [102]3 years ago
4 0
There are no examples you imbecile it’s A
You might be interested in
Which professional can film projects hire as part of their budgeted costs? You can hire special ____ lawyers and include their f
gregori [183]
This is clearly A it is not that hard
3 0
3 years ago
Kris, an IT manager at Park Infosystems, is handling four projects simultaneously. Each project has loaned and shared resources
Natalija [7]

Answer:

many-to-many relationship

Explanation:

They are different types of relationship between projects. A many-to-many relationship occurs when a row in a table associates with many related rows in another table. For example the relationship between an employee and a project, An employee can work on many projects and a project can have many employees working on it.

8 0
3 years ago
Read 2 more answers
A computer is completely compromised when it wont turn on or operate. What is the best way to fix
miskamm [114]

There really is no getting it back, if it is from a virus, then you need to buy a new computer. If it is something internal, depending on what type of computer you have it might just be best to buy a new one. Hope this helps :-)

8 0
3 years ago
Read 2 more answers
Your bank contacts you to phone a number supplied in the email. What do you do?
never [62]
Login thru a secure portal and verify messages and then report any issues. also another thing you may call your bank to make sure they are the ones who sent the email.
5 0
3 years ago
An Excel file can be saved as a Web page. T or F
Katen [24]

Answer:

True

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
    10·1 answer
  • How do you take a picture on this app
    10·1 answer
  • Suppose you want to encode the numerals 0–9 and the 26 letters of the alphabet, using separate codes for lowercase and uppercase
    13·1 answer
  • The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of betwee
    11·1 answer
  • How to unblock a website on a school computer? ASAP who's ever works will get Brainliest and will get a follow.
    14·2 answers
  • When code is compiled it
    6·2 answers
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • What does the x mean in .docx
    6·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!