1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
14

What is phishing?

Computers and Technology
1 answer:
alexira [117]3 years ago
7 0

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

You might be interested in
12. Which one of the following items would you be most likely to keep in a database?
AysviL [449]
The item that would be most likely to keep in a database would be the payroll records. The other items such as address book, financial statements and sales reports would not necessarily be placed in a database.

The answer would be letter A. 
3 0
4 years ago
Which part holds the "brains" of the computer?
Rus_ich [418]
The (CPU) holds the “brains” of the computer
7 0
3 years ago
The design strategy that starts with a global view of the entire problem and breaks the problem down into smaller, more manageab
In-s [12.5K]

Answer:

Top down design

Explanation:

Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.

C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.

The advantages of the top-down design approach are:

1) easy to manage

2) easy to find the error

3) easy to debug

4 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
The ________________ operation is required by the Iterable interface.
masya89 [10]

Answer:

For question one, the first line  It is Iteration, The second line is Comparator, the third line is none of these is correct.

Question two, the index based method  for (a) is O(1) (b) O(1) (c) O(N) (d) O(N)

Explanation:

<em>Solution to the question</em>

Question 1:

The Iteration operation is required by the Iterable interface.

n application can indicate a specific way to order the elements of a SortedABList list by passing a(n) Comparator so that we can customize the sorting object to a constructor of the list class.

Suppose a list names contains 8 elements. A call to names.add(0, "Albert") results in:  (e) None of these is correct

Question 2:

let us assume that the LBList is built on top of a Linked List and the ABList is built on top of an array:

(a) the add method index based  is O(1) in the average case  and  the O(N) in the worst case

(b) The Index based set operation is O(1) since we can simply move to any index of an array of time constant.

(c) It is O(N) since index Of method needs to look for  the whole array (based on worst case  or average) to get the index

(d)  It is O(N) since index Of method needs to find the whole linked list (on worst case or average ) to search  the index.

3 0
3 years ago
Other questions:
  • Which of these is a benefit of using the Sort option?​
    15·1 answer
  • At the beginning of this month, the balance of Reed's checking account was $692.35. So far this month, he has received a paychec
    13·2 answers
  • Assume that LO and HI have already been assigned as constants with LO &lt; HI, and x has been declared as DWORD in the data segm
    7·1 answer
  • What steps do you need to take to register
    14·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    6·1 answer
  • The engineering firm you work for is submitting a proposal to create an amphitheater at a state park. Proposals must be submitte
    15·1 answer
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • What is the foundational domain for business
    12·1 answer
  • Implementations <br> in c++ programming when finding lcm and gcd in c++​
    12·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!