Imagine that you are designing a smishing scam that involves sending text to people to entice them to go to a website and provide personal information that
you can use to access their checking account.
Open a new Microsoft® Word document and craft a text message that would be difficult for people to ignore.
Design a simple web page that would look legitimate to people who bank at your bank and that would capture their checking account number and PIN.

Answers

Answer 1

Answer:

Explanation:

i attached picture down check it below

Imagine That You Are Designing A Smishing Scam That Involves Sending Text To People To Entice Them To

Related Questions

HELP HELP HELP Help Helpl

Answers

Answer:

#include <stdio.h>

int main(void) {

 float number = 0;

 printf("Enter a number: ");

 scanf("%f", &number);

 

 number *= 2;

 printf("The number doubled is: %f\n", number);

 return 0;

}

Explanation:

Assuming you want a C program, see above.

What are the key features of knack

Answers

Answer:

User Access. Secure access for your users to manage their data.

Workflow & Automation. The right data for the right users at the right time.

Data Management. A single platform to collect, manage, and audit your data.

Reports & Dashboards. Realtime charts and formulas to report on your data.

Payments. ...

Integrations.

Explanation:

Which of the following expressions evaluate to 3.5

Answers

Answer: Some expressions equal to 3.5 are 7/2, 3.50, etc

Where is the hard drive located

Answers

Answer:

The hard drive is located in the drive bay.

In your pc duhhhhhhh

which type of files removed by Disk Cleanup took up the most space?

Answers

The type of files that can be removed by Disk Cleanup that took up the most space are:

Temporary Internet Files groupRecycle Bin files

Does Disk Cleanup remove all files?

Disk Cleanup is known to be a process that helps to free up space on any kind of hard disk, making an  improved system performance.

Note that  Disk Cleanup is one that searches your disk and then depicts temporary files, Internet cache files, as well as unnecessary program files that a person can be able to safely delete.

Therefore, based on the above, one can say that The type of files that can be removed by Disk Cleanup that took up the most space are:

Temporary Internet Files groupRecycle Bin files

Learn more about Disk Cleanup  from

https://brainly.com/question/26328363
#SPJ1

What's language processor?​

Answers

Answer:

A language processor is a software program designed or used to perform tasks such as processing program code to machine code. Language processors are found in languages such as Fortran and COBOL.

Compilers, interpreters, translate programs written in high-level languages into machine code that a computer understands. And assemblers translate programs written in low-level or assembly language into machine code.

2. Define what is a Flowchart and Algorithm?​

Answers

Answer:

an algorithm is a specific set of instrucions or rules for carrying out a procedure or solving a particular problem.

flow chart is a symbolic representation of an algorithm.

What is the Full form of DSLR

Answers

adjective
denoting or relating to a camera that c
camera with a digital imaging sensor,
"the ideal candidate will also have exp
Digital single lens reflex

Describe your Johari Window. Which area or areas are largest for you? Smallest?

Answers

The windows you have in full screen are the largest, the smallest ones are the ones you have hidden and are not shown in the taskbar

Audra is creating a training document and would like to include an image that she sees on her screen that she has marked up for training purposes.

Which options should Audra use?

Insert tab, Pictures
Insert tab, Screenshot
Insert tab, Online Images
Insert tab, Format

Answers

Answer:

insert scrnshot

Explanation:

because she probably wants to include the marks

I need a code that will calculate total workers hourly pay and overtime pay.

Part timers work 20 hours a week and they get "time and a half" for each overtime hour past 20 hours

NO IF STATEMENTS ALLOWED

Answers

Using the knowledge in computational language in python it is possible to write a code that will calculate total workers hourly pay and overtime pay.

Writting the code:

hrs = float(input("Enter Hours:"))

name= str(input("enter your name"))

rate = float(input("""how many days did you work?""")

if hrs <= 40 :

pay = 1.5 * hrs

elif hrs > 40:

pay = (rate * 40) + (rate1.5(hrs-40))

else:

print("dear", name , "your salary will be pend till next month")

print("Dear", name, "we are paying you:", "$",pay

See more about python at brainly.com/question/18502436

#SPJ1

in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.

Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831

Answers

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

Which is an advantage of Cloud Computing?

Answers

One advantage that cloud computing has is allowing us to pick up information easily. With cloud computing you can deploy your application in multiple regions in no time with a few clicks.

Write five examples of products that are needed in your school ​

Answers

1. Pencil/pen
2. Paper/ notebooks
3. Calculator
4. Folders/binders
5. Erasers

10 rules of Computer ethics​

Answers

Explanation:

what???????????......

Using the print() function, output, "Let's play Silly Sentences!"
Using the input() function, prompt the user to, "Enter a name: ", then assign and store their response to a variable.
Repeat benchmark 2 for the other 8 inputs that we need from the user: adjective, adjective, adverb, food, food, noun, place, and verb.
Using a print() function, output, "[name] was planning a dream vacation to [place]." Replace [name] and [place] with the proper variables.
Repeat step 4 with the other 6 lines of output.
Double-check to make sure the output is formatted correctly - including spaces before and after variables and line spacing.
Run and test your program with the values from the Sample Run.
Debug and repeat step 7 as needed.

Answers

Answer:

print("Let's play Silly Sentences!")

name = input("Enter a name: ")

adjective1 = input("Enter a adjective: ")

adjective2 = input("Enter a adj: ")

adverb = input("Enter a adverb: ")

food1 = input("Enter a food: ")

food2 = input("Enter another food: ")

noun = input("Enter a noun: ")

place = input("Enter a place: ")

verb = input("Enter a verb: ")

print( "\n" + name + " was planning a dream vacation to "+ place + "." )

print( name + " was especially looking forward to trying the local \ncuisine, including " + adjective1 + " " + food1 + " and " + food2 + ".")

print("\n" + name + " will have to practice the language " + adverb + " to \nmake it easier to " + verb + " with people.")

print("\n" + name + " has a long list of sights to see, including the\n" + noun + " museum and the " + adjective2 + " park.")

A ____________ transmits data packets from one computer network to another computer network.

Answers

Answer:

internet

Explanation: i got a b so if its rong sorry

A network switch transmits data packets from one computer network to another computer network.

What is a network switch?

A network switch connects devices in a network (such as computers, printers, and wireless access points) and allows them to 'talk' by exchanging data packets.

Switches can be both physical hardware devices that manage physical networks and software-based virtual devices.

A router is significantly more advanced and sophisticated than a switch. They can perform Network Address Translation (NAT), make faster routing decisions, and use routing algorithms to route data across large networks.

Routers connect multiple LANs, whereas switches operate within a single LAN.

A network switch connects and transmits data packets to and from local area network devices (LAN).

Thus, the answer is network switch.

For more details regarding network switch, visit:

https://brainly.com/question/14583548

#SPJ2

Similarities between the primary memory and the secondary memory​

Answers

Answer:

Primary and secondary

Explanation:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

WHICH OF THE FOLLOWING IS A CLASSICAL ALGORITHM APPLIED TO MEDERN CRYPTOGRAPHY
A: LINEAR SEARCH
B: PSEUDORANDOM NUMBER GENERATOR
C: BINARY SORT
D: MODULAR ARITHMETIC

Answers

The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

What is a pseudo random generator in cryptography?

In regard to the theoretical computer science and cryptography, a pseudorandom generator (PRG) is known to be used for a class of statistical tests.

It is said to be one that is known to be a kind of a deterministic method that is often used in the mapping if a random seed so that it can be able to be a longer type of pseudorandom string.

It is one where there is no need for statistical test in the class that can be used to tell the difference between the output of the generator as well as that  of the uniform.

Therefore, The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

Learn more about CRYPTOGRAPHY from

https://brainly.com/question/88001
#SPJ1

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

Identify two uses of 3D printing that help doctors and patients in hospitals.​

Answers

Answer: Prosthetic and Diagrams

Explanation:

Prosthetics are made by 3D printing, used as a new stand in for a missing limb. Like if you were to loose a leg or an arm, 3D printing creates the outer shell most times. Diagrams are used to show examples to patients of their condition, or even sometimes for other doctors to get a better understanding of a condition. They may show them to patients to give an example of what may need to happen too. For doctors they may also be used to figure out what plan of action may be needed.

Question 23. Which of the following is NOT a useful vehicle feature from a security perspective O Internal hood release lever O Power locks O Wi-Fi capable O Lock on gas cap O Power windows​

Answers

Answer: internal hood release lever

Explanation:

Select the correct word to complete the sentence.
The original ARPANET had four nodes and connected groups at
dispersed.
to research computers that were geographically

Answers

The original ARPANET had four nodes and connected groups at academic institutions to research computers that were geographically dispersed.

What purpose did the ARPANET serve?

The primary applications of ARPANET were in academia and research. Since the ARPANET is regarded as the precursor to the current internet, many of the protocols used by computer networks today were created for it.

Note that the ARPANET, in full term is said to be an Advanced Research Projects Agency Network, experimental computer network that was said to be the first ever use of the Internet.

Therefore, The original ARPANET had four nodes and connected groups at academic institutions to research computers that were geographically dispersed.

Learn more about ARPANET from

https://brainly.com/question/2323287
#SPJ1

All of the fallowing are statements describing normal mechanical fan clutch operation EXCEPT:

Answers

The statements above are describing normal mechanical fan clutch operation except D. A fan clutch varies fan speed according to engine speed.

Why the above option chosen?

A properly functioning or operating fan clutch will be one that alter  the speed of the fan based on the engine temperature.

Not that if the engine is cold, the fan clutch is one that has no power to turn the fan very fast, even if engine speed is brought up. As the engine warms up, the fan clutch goes up on the speed of the fan.

Therefore, based on the above, The statements above are describing normal mechanical fan clutch operation except D. A fan clutch varies fan speed according to engine speed.

Learn more about clutch from

https://brainly.com/question/13262716

#SPJ1

All of the following are statements describing normal mechanical fan clutch operation EXCEPT:

A. A fan clutch has viscous drag regardless of temperature.

B. A fan clutch varies fan speed according to engine temperature.

C. A fan clutch stops the fan from spinning within two seconds after turning off a hot engine.

D. A fan clutch varies fan speed according to engine speed.

Assuming there are 7.481 gallons in a cubic foot. Write a program that asks the user to enter a number of gallons, and then displays the equivalent in cubic feet.


The program must use assignment operators, cout’s, cin’s, and declaration of variables.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter a number of gallons.

Writting the code:

#include <iostream>

using namespace std;

int main()

{

      float gallons, cufeet;

      cout << "\nEnter quantity in gallons : ";

      cin >> gallons;

      cufeet = gallons / 7.481;

      cout << "Equivalent in cublic feet is " << cufeet << endl;

      return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

What is a problem? Give an example of a business problem and discuss how a computer-based information system could solve it?​

Answers

For example lets take a business that provides IT services, so the company might face majority of issues and one of them could be outdated system and equipments, in result this can make the business owner suffer from the complexities of integrating new hardware or software into their existing networks, so lastly its always important to have a regular maintenance on your current devices and to use support services when necessary.

main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals

Answers

The main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals is motherboard.

What is motherboard?

A computer's main board is referred to as the "system board" or "motherboard," while smaller ones that plug into slots on the main board are referred to as "boards" or "cards." See also the terms motherboard, expansion card, and flexible circuit.

The motherboard is the primary wire harness of a computer. It's a thin plate that houses the CPU, memory, hard drive and optical drive connectors, expansion cards to control video and audio, and connections to your computer's ports (such as USB ports).

Thus, the answer is motherboard.

For more details regarding motherboard, visit:

https://brainly.com/question/28329392

#SPJ1

JAVA: People find it easier to read time in hours, minutes, and seconds rather than just seconds. Write a program that reads in seconds as input, and outputs the time in hours, minutes, and seconds. Ex: If the input is: 4000 the output is: Hours: 1 Minutes: 6 Seconds: 40

Answers

Hope this helps mate

this is confusing and need help so please help me right now

Answers

In order to round a given number to n decimal places in Java, you would use two methods and they are:

Round a Number using format

public class Decimal {

  public static void main(String[] args) {

       double num = 1.34567;

       System.out.format("%.4f", num);

   }

}

Round a Number using DecimalFormat

import java.math.RoundingMode;

import java.text.D ec im al Fo rmat;

public class Decimal {

  public static void main(String[] args) {

       double num = 1.34567;

       DecimalFormat df = new DecimalFormat("#.###");

       df.setRoundingMode(RoundingMode.CEILING);

       System.out.println(df.format(num));

   }

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

HELP NOW!
Which of the following makes the varied types of digital communication possible?


an agreed-upon set of rules and standards governing the way technology shares and manages data


properly linking all of the workstations on a closed loop-like configuration


refraining from relying too heavily on one central hub that connects all nodes on a system


only using a high-quality server computer with lots of memory

Answers

Answer:

An agreed-upon set of rules and standards governing the way technology shares and manages data

Other Questions
After rock y is released from rest several seconds after rock x is released from rest, what happens to the separation distance s between the rocks as they fall but before they reach the ground, and why? take the positive direction to be downward. define labor in an economic way Let F(x)=x2-19 and G(x) = 14-xFind (F/G)(-3) john loke belived in the social contact which proposed what a: people have the right to life liberty and happinessb: people took an oath to be loralty to the king or c: divine was right justification alone for proper goverment In the poem THE TIGER BY WILLIAM BLAKE?Q)How has William Blake woven the concept of evil representation through the animal tiger. Bob fenced in his backyard. the perimeter of the yard is 22 feet, and the length of his yard is 5 feet. use the perimeter formula to find the width of the rectangular yard in inches: p = 2l 2w. (1 foot = 12 inches) What event is depicted in this painting? A technician repaired 18 laptops and24 desktops last month. What is theratio of laptops to total computers? CrosswordComplete the crossword using the Clues below ACROSS1. hache, o, te, e, ele4. ere, e, ese, te, a, u, ere, a, ene, te, e5. ce, a, ese,6. ene, i, ee, oLlamaDOWN2. elle, a, eme, a3. ve, e, te, e, ere, i, ene, a, ere, i,7. u, ve, a, ese8.a, the, ge, e, ene, te, ere, a A _ explosion fills one with terror ive an example of how participating in a water activity by yourself could be dangerous, even if it is a simplectivity that you frequently do. Why do the water molecules change between states? why does the legislative branch of the government represent the people most directly? What is the principal job of this branch? If something contains carbon, it is called___________ and if something does not contain carbon, it is called_______________. independent, dependent living, non-living matter, energy organic, inorganic Listen to the spelling word and fill in the blank. How much does that bale of hay___? question 1 data analysis is the various elements that interact with one another in order to provide, manage, store, organize, analyze, and share data. If limestone (CaCO3) is heated, 2.8Kg of calcium oxide (CaO) and 2.2Kg of carbon dioxide are produced.a. Write the balanced chemical equation. b. Determine mass of the used limestone your friend insists that cigarette smoking calms his nerves, but you are skeptical because in reality, nicotine is a(n) a) depressant. b) neuromodulator. c) stimulant. d) opiate. 4|2x + 5|-79How would you solve this? major criticisms of social psychology are that it is trivial because it documents the obvious and that it is because the findings could be used to manipulate people.