1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
11

Can you please look through this code and see wants wrong with it? its in python

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
3 0
I’m confused what are you trying to ask? What is the python?
You might be interested in
Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
LuckyWell [14K]

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

6 0
3 years ago
The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.
Scilla [17]

Answer:

a. True

Explanation:

The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.

8 0
3 years ago
Select the correct answer.
Softa [21]

Answer:

MY ANSWER IS B.

Explanation:

B.A+(B.C)

3 0
3 years ago
Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
Lady bird [3.3K]

Its

Processes the data on the computer .

5 0
3 years ago
Read 2 more answers
Coding with Loops Worksheet
BartSMP [9]

Answer:

if you give me brainliest i will answer your question

Explan

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it more important now than ever before to know how to evaluate websites and other online sources of information?
    7·1 answer
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • In report design view, you can use commands on the align button of the _____ tab.​
    11·1 answer
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • Analyze the following code. // Program 1: public class Test { public static void main(String[] args) { Object a1 = new A(); Obje
    5·1 answer
  • The theory of logic set the foundation for what aspect of computing today?
    11·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • I need so much help, can anyone please help me?
    15·1 answer
  • AYUDAAA ESPARA HOYYY
    14·2 answers
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!