A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred

Answers

Answer 1

Answer: The man's info has been found and a hacker was trying to make him confirm his passwrd so he can get a hold of it to hack the man further.

Explanation:


Related Questions

Hi there! I need a bit of help on my computer's assignment. Question is below!


[tex]\underline{\large\text{Question}}[/tex]

Selena would like go back to a page that she visited recently. She should use the _____.


A) links in the display window


B) scroll bar to scroll up through the pages


C) back button in the navigation bar


D) click on the back button in the display window


[tex]\underline{\large\text{Exceptions:}}[/tex]


The answer must:


- Be correct.

- Be well explained


The answer must not include:


- Spams

- Incorrect answers

- Incomplete explanation


Good luck :)

Answers

Answer:

The back button of the navigation bar

Explanation:

The back and forward buttons are standard on the many web browsers. The navigation bar is the same place where you type your URLs. In this case, Selena would use the back button to go back to an active window she had previously visited. It helps you move backward in the same order you previously made your visits.

Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What method of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.

Answers

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

The ______ moving air alone will charge suspended particles and cause the buildup of static electrical charges on people and objects in the environment​

Answers

Answer:

friction

Explanation:

the resistance that one surface or object encounters when moving over another. Alsothe action of one surface or object rubbing against another.

12. Fill in the blanks: In a ____________, the root of the tree is labeled _______________, children of the root are the names of _______________, and the leaves designate ___________. These trees help generate ____________ used to evaluate architectural alternatives. g

Answers

Based on the description of the tree, the missing words are:

Binary tree. Root node. Internal nodes. External node.Structure.

What are the parts of a binary tree?

In a Binary tree, the roots are called the root nodes and the children of those roots are called the internal nodes.

The leaves are meant to designate the external nodes. These trees are helpful in evaluating architectural alternatives because they provide structure.

Find out more on binary trees at https://brainly.com/question/14990156.

Suggest 2 reasons why a system might maintenance after a while

Answers

Answer:

Prevention Against Viruses and Malware.

Speed up Your Computer.

Explanation:

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.

Answers

SHA-1 produces a(n) 160-bit message digest, which can then be used as an input to a digital signature algorithm.

What is SHA-1?

Secure Hash Algorithm 1 or SHA 1 is a function which take the input value. In the result, it produces the hash value of 20 byte.

As there is 8 bit in 1 byte. Thus, the number of bits in 20 byte are,

[tex]n=20\times8\\n=160\rm\; bits[/tex]  

Hence, it produces 160 bit of hash value, which is known as the massage digest.

Thus, SHA-1 produces a(n) 160-bit message digest, which can then be used as an input to a digital signature algorithm.



Learn more about the SHA-1 here;

https://brainly.com/question/9979590

#SPJ1

Create code in HTML of a webpage that has an image that opens a page with the Wikipedia website when clicked. (Refer to Image)

Answers

Here is the Code.

you may need to change it a bit

Hopefully it Help you out :-)

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses __________ to sign the message.

Answers

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses his or her own private key to sign the message.

The sender of the message uses his or her own private key to sign the message.

Which kind of key is used for asymmetric encryption?

Asymmetric encryption is known to be a kind of public key encryption, but and it is one that is made up of key pair.

They are the public key and the private key and as such, In the digital signature technique when the whole message is signed using an asymmetric key, The sender of the message uses his or her own private key to sign the message.

Learn more about digital signature from

https://brainly.com/question/13041604

#SPJ2

Check My Work To create a link to a webpage, you insert code in a(n) _____ document that references the webpage by name and location.

Answers

To create a link to a webpage, the code insert in an HTML document that references the webpage by name and location.

What is HTML document?

HTML document is the file document which contains the HyperText Markup Language.  

Features of HTML document-

When the location of HTML document is on the web browser, it behaves as document object.This type of documents are saved in machine language tools.It is saved with the extension .htm or .html.HTML document which references the webpage by name and location.

Thus, to create a link to a webpage, the code insert in an HTML document that references the webpage by name and location.

Learn more about the HTML document here;

https://brainly.com/question/20280664

#SPJ1

The set of instructions that define how to display the html elements in your site is:.

Answers

Answer:

CSS

Explanation:

Select the correct answer.
If a user clicks on the hyperlink generated by the following code, where will the web browser redirect the user?

Click here to go to first table

A.
a web page called “table1”
B.
a website with the search tag “table1”
C.
an element on the same page with the id “table1”
D.
a paragraph on the same page with the text “table1”

Answers

Answer:

A.

Explanation:

The hyperlink will send you whatever the link was.

Enrique, a web developer, is creating a new website for a customer and is using Ruby to provide dynamic content for the web
pages. Which language type is he using?
Scripting
Compiled
Assembly
Machine

Answers

The development of the web pages for the website with the Ruby language is using scripting.

What is Ruby?

Ruby is the computer programming language and is used for the development of websites, software, and other applications with simple syntax.

The development of the website by Enrique is based on the formation of the syntax with the works that form the running of the application. He has been using scripting for the development of web pages. Thus, option A is correct.

Learn more about the Ruby language, here:

https://brainly.com/question/9966767

#SPJ1

An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific application protocols

Answers

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

What Is an Application Attack?

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

https://brainly.com/question/25633298

What type of software permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson

Answers

The type of software which permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson is called screencast.

What is screencast?

The screencast is the software which used to record the video of the screen of a computer. These types of software are build for the following purpose.

Uses to record, what a one sees on his computer.Such type of software are used to create the lesson as the facility of audio narration is provided in it.This software is helpful for the student who prefer self study.Many education organizations create learning with different screencast software.

Thus, the type of software which permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson is called screencast.

Learn more about the screencast here;

https://brainly.com/question/15878080

#SPJ1

You will be using your pH meter again for this experiment. If your pH meter stops working (or is no longer working), what are your options for troubleshooting

Answers

Answer:

If your pH meter does not work, there are other ways to find out the pH, the popular one being litmus paper or indicator paper, which changes color based on the acidic or basic -ness of the object being tested.

~

If you are using an incrementing variable to iterate over a list, the variable should be set to zero before the loop begins.

Answers

Answer:

It will be True

To make the most informed purchasing decision, you should:
• A. read descriptions to learn if the product has features you want.
• B. read online testimonials to see if others are happy with the
product.

C. look at how many people own the product to see if it is popular.
• D. watch a video from the manufacturer to find out the best features.

Answers

Answer:

its either A or B but im leaning more towards B

Explanation:

A user installs a financial software package that requires cloud access. For some reason, the application fails to connect to the cloud server. What caused this issue

Answers

Answer:

A. Duplicate IP (Internet Protocol) address B. Incorrect host-based firewall settings C. Incorrect time D. Unresponsive service

Explanation:

A user installs a financial software package that requires cloud access. For some reason, the application fails to connect to the cloud server. What caused this issue? A. Duplicate IP (Internet Protocol) address B. Incorrect host-based firewall settings C. Incorrect time D. Unresponsive service

You are writing an algorithm and want to tell the computer what to do if the user does not perform an action. Which type of statement should you include in your algorithm?

Answers

Answer:

If-else statements.

Explanation:

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

pseudo code will look something like this:

if (condition):

do 1, 2, 3, ...

else:

do 4, 5 , 6, ...

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

What is Algorithm?

In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

All aspects of information technology employ algorithms extensively. A simple technique that resolves a recurring issue is typically referred to as an algorithm in mathematics and computer science. Algorithms are essential to automated systems because they serve as specifications for processing data.

An algorithm may be employed for simple tasks like sorting lists of numbers or for more challenging ones like suggesting user content on social media. The starting input and instructions for an algorithm's computation are often provided.

Therefore, If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

To learn more about Statement, refer to the link:

https://brainly.com/question/2285414

#SPJ7

You have an unsorted array of 1,000,000
people.
You are using a Linear Search to look for
someone who is not in the array at all.
How many people does the computer look at
before it realizes this person is not in the array?
O a
b
Ос
Od
(a)exactly 1
(b)about 500,000
(c)all 1,000,000
(d) it will search forever
(d)It will search forever.

Answers

I’m pretty sure it’s C.

Why is it more beneficial to interact with your audience using hootsuite, rather than engaging natively from specific social accounts?.

Answers

Answer:

Hootsuite more accurately estimates the dollar value of a like, share, and retweet.

Hootsuite allows you to see the contents of private profiles, providing thorough and accurate customer insights.

Hootsuite has an ‘auto-engagement’ feature that interacts with your followers

Hootsuite lets you create specific streams to monitor social media engagements, and respond efficiently in one workspace

more accurately than social networks’ native AI functionality.

Vivian went to the gym and asked people if they like to exercise. To avoid bias in her survey, Vivian should

ask her survey question at another gym
count each tally mark as two people
use a bigger sample size
use a smaller sample size

Answers

ask her survey question at another gym

Vivian went to the gym and asked people if they like to exercise. To avoid bias in her survey, Vivian should ask her survey question at another gym. Thus, option A is correct.

What is a random sample?

Random sampling is the method of selecting the subset from the set to make a statical inference. An employee at a gym wants to select a random sample of gym members for a survey about their exercise habits.

The first is not a fluke. He's simply tasting the first gym attendees. The second is not a coincidence. He's just taking samples from one zip code. The third is completely random. He's generating numbers with a random number generator. The fourth is not a fluke. Only volunteers are being sampled.

Regular physical activity can improve your muscle strength and boost your endurance. Exercise delivers oxygen and nutrients to your tissues and helps your cardiovascular system work more efficiently. And when your heart and lung health improve, you have more energy to tackle daily chores.

Thus, option A is correct.

Learn more about exercise on:

https://brainly.com/question/30094654

#SPJ2

The following function is supposed to return -1 when x is negative, +1 when x is positive, or if x is zero. What, if anything, is wrong with the function? def plusMinusZero(x): if x == 0 : return 0 elif x <= 0 : return -1 else x >= 0 : return 1 A. A return statement must be added at the end of the function B. Both occurrences of elif must be replaced with if C. The <= and >= must be replaced with < and > D. Nothing is wrong with the function

Answers

def dx(fn, x, delta=0.001):

   return (fn(x+delta) - fn(x))/delta

def solve(fn, value, x=0.5, maxtries=1000, maxerr=0.00001):

   for tries in xrange(maxtries):

       err = fn(x) - value

       if abs(err) < maxerr:

           return x

       slope = dx(fn, x)

       x -= err/slope

   raise ValueError('no solution found')

these are pictorial images displayed on a computer screen​

Answers

Answerthats nice

(: -With Star

Explanation:

What is cloud computing?
O It is a way to store information on an independent server for access from any device.
O It is a way for people to consolidate their social media presence to one website.
O It is a way for users of social media to monitor the information they are making public.
O It is a way to predict complicated weather patterns using the Internet and a series of satellites.

Answers

Answer:O It is a way to store information on an independent server for access from any device.

Explanation:

Because its in the cloud the cloud isa type of software that stores data

A small software company is starting to work with the AWS Cloud. Which service will allow them to find, test, buy, and deploy software that runs on AWS

Answers

Answer:

Elastic Beanstalk

Explanation:

Elastic Beanstalk: AWS Elastic Beanstalk is an easy-to-use service for deploying and scaling web applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS.

Which of the following CSS rules will select the HTML element with the id logo and set the font size for that element to 60 pixels?
i. logo {
font-size: 60px;
}
ii. logo {
font-size: 60px;
}
iii. logo {
font-size: 60px;
}
iv. id="logo" {
font-size: 60px;
}

Answers

The CSS rules that can select the HTML element with the id logo and set the font size for that element to 60 pixels is #logo {font-size: 60px.

What are HTML elements?

The <html> element is known to be the background or root element and it is one that tells more about the whole HTML document.

Note that in the above scenario, the option that will select the HTML element with the id logo and set the font size for that element to 60 pixels is #logo {font-size: 60px.This is because it will give the accurate form of what it is about.

Learn more about  HTML element  fromhttps://brainly.com/question/13164785

Who paid for the development of the internet, and why?.

Answers

Computer scientists whose research was heavily financed by the federal government, most notably through Darpa, the research arm of the Defense Department

- What information do you obtain from the double digest XhoI/AlwNI? What is your expectation if the plasmid is a reclosed vector without an insert? What is your expectation if your plasmid has an insert in the correct orientation (how many bands, what are their sizes)? - What is your expectation if your plasmid has an insert in the incorrect orientation (how many bands, what are their sizes)?

Answers

Plasmids are used as vectors in recombination technology to transfer genes. Plasmids or the genes can be double digested by two restriction endonucleases simultaneously.

What are restriction endonucleases?

Restriction endonucleases are the enzymes that identify the precise DNA sequence to cleave them from the rest of the sequence.

If a plasmid is reclosed vector without an insert then only one band of size 2964 bp will be seen. A plasmid that has correct orientation will have two bands of sizes 1570 and 2100 bp.

If the plasmid has a sequence in incorrect orientation then will also result in two bands but of different sizes like 2740 bp and 940 bp.

Therefore, plasmids can be used as vectors.

Learn more about plasmids here:

https://brainly.com/question/17156726

#SPJ1

Custom-built mini-programs that can execute a complicated series of commands in a tool like microsoft word or excel are called.

Answers

Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros.

What is a macro program?

Macros are known to be a type of programs that functions by automating some commonly used processes or tasks that are found in the Excel.

Note that Custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft word or excel are called macros as a often  records day to day operations through the use of keystrokes or a mouse.

Learn more about  mini-programs from

https://brainly.com/question/24833629

#SPJ1

Other Questions
This trait is represented by a lowercase letter and hidden whenever a dominant allele is present.DominantOrRecessive please help me find the slope!! What is April 23 Children's Day and where is it celebrated? Please HelpA triangle has a base of 13 inches and an area of 82.5 inches. What is the height of the triangle? A person on a bicycle travels a distance of 12.5 km in 2.1 hrs, what was the speed of the person on the bicycle? What were Conversos?Spanish priests who accepted ProtestantismSpanish Jews who converted to ChristianitySpanish court officials who opposed the Alhambra DecreeSpanish Catholics who converted to Judaism A wire is joined to points X and Y in the circuit diagram shown. A diagram of a circuit with a power source on the left. Directly above the power source is a dot labeled X and then a circle with an X in it. The circuit then splits with one path straight back to the power source and the other path has 3 circles with X in them labeled 2, 3, and 4 respectively. There is a point labeled Y between circles 2 and 3.A diagram of a circuit with a power source on the left. Directly above the power source is a dot labeled X and then a circle with an X in it. After the x are 4 different circles on the circuit with Xs in them labeled 1, 2, 3, and 4 respectively. There is a point labeled Y in between circles 2 and 3. There is a branch of the circuit from X to Y. How does the circuit change when the wire is added? A closed circuit occurs and makes all bulbs turn off. An open circuit occurs and makes all bulbs turn off. A short circuit occurs and makes bulbs 3 and 4 turn off but keeps bulbs 1 and 2 lit. A short circuit occurs and makes bulbs 1 and 2 turn off but keeps bulbs 3 and 4 lit. Select each number that is between 535% and 6.01 x 10.10 poin The governor has proposed an idea for a new law inFlorida that will require kindergarten students to pass adifficult test to be promoted to first grade. Parents ofkindergartners in Florida are very upset about this newbill.Which state agency would be the best for parents tocontact to voice their concerns about this issue?Florida Department of RevenueFlorida Department of TransportationFlorida Department of EducationFlorida Department of Justice What are the roles of the fcc in the us? fcc- federal communications commission choose three answers. regulating the countrys communications infrastructure ensuring communication technology is compatible with existing technology establishing safety standards for pesticides and other chemicals assigning frequencies to television, radio, cable, and satellite providers bringing civil suits against individuals or businesses for breaking security laws investigating complaints, inspecting workplaces, and imposing penalties Columbus talks repeatedly about others that have said there is land west of the Canaries. Based on this knowledge, which of the following is most likely true? A. He doesn't have enough crew members. B. He is going to quit sailing. C. He might be lost. D. He is sinking. Find the equation of a line parallel to y=4x+2 that contains the point (2,3). Write the equation in slope-intercept form. PLEASE HELP self-serve kiosks are most appropriate forO quick-service restaurantsO fast-casual restaurantsfull-service restaurantsfancy restaurants A factorys production is modeled by function f(x) where f(x) is the number of parts produced per hour and x is the number of people working during production choose the ordered pair that represents a posible domain and range of the function Suppose that research finds a link between high fructose corn syrup (HFCS) and obesity, which then leads American consumers to switch from HFCS products to pure cane sugar products. The graphs show the markets for cane sugar in Haiti and the United States before the studies were divulged. Shift the curves in the graphs, including the horizontal world price curve, to describe the new trade equilibrium that results after the switch in preferences of American households, and then answer the followup question.Assume that the United States and Haiti are the only nonHFCS sugar trading parties in the world and that there are no quotas, subsidies, or tariffs distorting these markets. Expand and simplify:a) -1/3{6(p+q)-3[p-2(p-3q)]}A=-3p+4qb) y-2/3(9x-3y)A=-6x+3y(The answer is written at the back of our books but I am struggling with the working I mean how to achieve the answer?) 1 The ability to do work is called Eddie O'Neil found a sports car advertised at a local used-car dealership for$34,000. The car is clean and in good condition. Its average retail value is$33,400. It has air-conditioning valued at $840 and leather seats valued at $200,but it does not include a CD player, which is valued at $100. The used-vehicleguide indicates that $1,690 should be deducted for excessive mileage on the car. O'Neil plans to visit the dealership this evening. What is the average retail pricefor this vehicle? I need 2, 4, 7, and 3's angles pls! The stress placed on a normal fault istensionalcompressionalfrictionalsymmetrical