1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

What to do if you click on a phishing link on iphone

Computers and Technology
2 answers:
ser-zykov [4K]3 years ago
6 0
Nothing just exit out of it
gregori [183]3 years ago
5 0

Answer:

Nothing, just exit out of it

Explanation:

You might be interested in
Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
soldier1979 [14.2K]
D scanner She can scan the files and email a digital copy.
4 0
2 years ago
Read 2 more answers
TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
ivanzaharov [21]

The Rearrangement of the words are:

  1. Ear map
  2. Rent cup
  3. METREON
  4. Sister or
  5. Sister Cane

<h3>What is arrangement of words?</h3>

A sorting method is known to be the orders of entries that are based on each word or phrase found in a heading, e.g. spaces, etc.

The Rearrangement of the words are:

  1. Ear map
  2. Rent cup
  3. METREON
  4. Sister or
  5. Sister Cane

Learn more about Arrangement from

brainly.com/question/984329

#SPJ1

6 0
1 year ago
_________ are the special effects that you see when one slide changes to another in slide show view​
lisabon 2012 [21]

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

8 0
3 years ago
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
Which one of the following items would you be most likely to keep in a database ?
DerKrebs [107]
C.) Payroll records. These are the most extensive and data-intensive.
8 0
3 years ago
Other questions:
  • Pete Jones, a bait shop owner, incorporates ______ within a webpage to entice customers to buy a new lure.
    7·1 answer
  • Why is it important to send a cover letter with a resume?
    12·2 answers
  • Which of the following statements is true?
    8·1 answer
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtai
    11·1 answer
  • What is random access memory?
    6·2 answers
  • Why is data processing done in computer
    10·1 answer
  • Write a program to create a customer bill for a company. The company sells only five products: TV, DVD player, Remote Controller
    12·1 answer
  • What is the largest place value in a 12 bit binary number?
    10·1 answer
  • Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!