You have been receiving a lot of phishing emails sent from the domain kenyan.msn.pl. Links within these emails open new browser windows at youneedit.pl. You want to make sure that these emails never reach your inbox, but you also want to make sure that emails from other senders are not affected. What should you

Answers

Answer 1

The thing that should be done is to add kenyan.msn.pl to the email blacklist.

What is phishing?

It should be noted that phishing simply means an attempt to steal ones money by taking the users information online.

In this case, the thing that should be done is to add kenyan.msn.pl to the email blacklist.

Learn more about phishing on:

brainly.com/question/2537406

#SPJ12


Related Questions

What dsl variant has a distance limitation of 18,000 ft. between a dsl modem and its dslam?

Answers

The dsl variant that has a distance limitation of 18,000 ft. between a dsl modem and its dslam is known as asymmetric dsl.

What is asymmetric dsl?

It should be noted that the asymmetric dsl (digital subscriber line) is a popular internet access solution for residential locations.

It enables an existing analog telephone to share the line used for data for the transmission voice and data.

Learn more about dsl on:

brainly.com/question/14599737

#SPJ12

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example for.

Answers

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

What are security misconfigurations?

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

https://brainly.com/question/14613247

#SPJ1

to link the data from one table to another in an access relational database, a(n) ____ must be common to each table.

Answers

To link the data from one table to another in an access relational database, a field must be common to each table.

Want is database?

It should be noted that database simply means an organized collection of structured information or data stored in a system.

In this case, to link the data from one table to another in an access relational database, a field must be common to each table.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

Create a chart on basic commands used in HTML.
It should include basic body structure of HTML also.And make it beautiful

Answers

basic HTML commands

1 the head tag

2 titles

3 the body tag

4 headers

5 paragraph

6 performance text

7 bold face and italics

the HTML tag Al truth not currently required by the all clients the HTML tag signals the point where tax should started being interprinted as HTML code

4. Ernesto works in a small office with five other people. What are two possible connection
issues Ernesto might encounter if the company uses a LAN?

Answers

LAN is the networking device and channel that interconnects the local area systems. If the company uses LAN, then issues with speed and connectivity will occur.

What is LAN?

The local area network connects the computers of small and local regions confined to small geographical areas and is seen in the schools, offices, and residences.

If LAN is used between more people then the internet speed and connectivity will be affected as there will be redundancy in the data packet transfer speed.

Therefore, the speed and connectivity will be affected.

Learn more about LAN here:

https://brainly.com/question/14308916

#SPJ1

list of history of generation computer?​

Answers

First-generation — 1940–1956used vacuum tubesENIAC, UNIVAC I, IBM 650, IBM 701, etc.Second generation — 1956-1963used discrete transistorsIBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.Third generation — 1964-1971used integrated circuits (but not microprocessors)IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.Fourth-generation — 1971-presentuse microprocessorsPDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.Fifth-generation — (current research)artificial intelligence and quantum computing

Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

Answers

Answer:

Internet transportation exchanges brings together shippers who post LOADS and carriers that post their AVAILABLE CAPACITY in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

What might you expect to find out about people who are described as credit risks?

Answers

What might you expect to find out about people who are described as credit risks? They have a history of not making their payments on time. Which is a long-term consequence of making late payments on your bills? It will be harder to secure a new loan at a low rate.

15 POINTS FOR THE ANSWERS ASAP
Which type of portfolio would you prefer to have? Why did you pick that portfolio?

Answers

Answer:

Aggressive Portfolio

Explanation:An aggressive portfolio takes on great risks in search of great returns.

Select the correct answer. In the decision-making process, after you have chosen the right solution, what is the next step? A. Act on your decision. B. Reflect on your decision. C. Gather information. D. Identify the problem. Reset Next

Answers

In the decision-making process, after you have chosen the right solution, the next step is to act on your decision.

How do you act on your decision?

A person act on their decision-making by putting those decision taken into use.

Therefore,  In the decision-making process, after you have chosen the right solution,  the next step is to Act on your decision as it entails bringing the decision to light.

Learn more about decision-making from

https://brainly.com/question/3432001

#SPJ1

what is the size of the rc.conf file in bytes

Answers

Answer:

It is 281 bytes.

The size of the rc.conf file in bytes is known to be 281 bytes

What is rc conf file?

The rc. conf file  is known to be a kind of file that often specifies the vital  services that needs to be turn on or enabled in course of system startup.

Note that in the case above, The size of the rc.conf file in bytes is known to be 281 bytes.

Learn more about bytes from

https://brainly.com/question/6835146

#SPJ11

is CLI and DOS the same ??​

Answers

Yes they are the same
Yes they are the same

ram is ________ and has no moving parts.

Answers

RAM is Electronic (solid state) and has no moving parts.

What is a RAM in computer?

RAM is known to be an random-access memory as it is said to be a short term memory and it is the place where data is saved as the time the processor requires for it.

Note that RAM is Electronic (solid state) and has no moving parts as it is often inbuilt in a computer system.

Learn more about RAM From

https://brainly.com/question/13196228

#SPJ11

You are the network administrator for a small organization. recently, you contracted with an isp to connect your organization's network to the internet to provide users with internet access. since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. what type of network hardware should you implement to prevent this from happening again

Answers

The type of network hardware that you should to implement so as to prevent this from happening again is Firewall.

What is a Firewall?

A Firewall is known to be a kind of network security machine that helps to monitors and run through any incoming and outgoing network traffic through the use of firm's  formerly  set up security policies.

Note that, a firewall is made as a kind of the barrier and as such, The type of network hardware that you should to implement so as to prevent this from happening again is Firewall.

Learn more about network hardware from

https://brainly.com/question/12716039

#SPJ1

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

(config)# service password-encryption

Explanation:

A system administrator could use service password-encryption command to prohibit any specified credentials from showing in text format in configuration files. This command secures all passwords in the config file that have been specified.

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

An administrator can use the service password-encryption command to stop all configured passwords from being displayed in configuration files as plain text. All configured passwords in the configuration file are encrypted by this command.

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

Hence, to prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

Learn more about the configuration file here:

https://brainly.com/question/32311956.

#SPJ6

What is the best example of personally identifiable information.

Answers

Answer:

Social Security Number, Drivers License Numbers, Credit Cards.

The government of Pakistan in collaboration with the government of China initiated (CPEC) project (China-Pakistan Economic Corridor). You are required to make a portfolio on CPEC project.

The portfolio must include:

(1) Inaugurations date.
(2) Countries involved (Beneficiaries).
(3) Route / Map.
(4) Length of the route.
(5) Security measures for the project.
(6) Potential benefits for Pakistan.
(7) Foreign threats to the project.
(8) Impact on employment for local population.

Answers

China and Pakistan are connected through the China-Pakistan Economic Corridor.Since 2013, Pakistan has been home to a number of infrastructure projects that are part of the China-Pakistan Economic Corridor (CPEC). By 2020, the value of CPEC projects will have increased to $62 billion from their initial estimate of $47 billion. By building modern transportation networks, many energy projects, and special economic zones, CPEC aims to quickly update Pakistan's necessary infrastructure and boost its economy.  When Chinese cargo was transferred overland to Gwadar Port on November 13, 2016, CPEC began to function in part, while some significant power projects were completed by the end of 2017.Under the auspices of CPEC, a massive network of roads and railroads will be constructed that will traverse the whole country of Pakistan. According to government estimates, inefficiencies in Pakistan's transportation system result in a loss of 3.55 percent of the nation's annual GDP. Under the CPEC, up-to-date transportation systems will be constructed to connect the seaports of Gwadar and Karachi with northern Pakistan as well as farther-flung locations in western China and Central Asia. As part of CPEC, a 1,100-kilometer road will be constructed between Karachi and Lahore, while the Karakoram Highway from Hasan Abdal to the Chinese border will undergo a comprehensive overhaul and reconstruction. By December 2019, the Karachi-Peshawar main railway line will also be improved, enabling trains to run at high to 160 km/h. The Southern Xinjiang Railway of China will eventually be connected to Pakistan's railway system in Kashgar. Subsidized concessionary loans will provide the estimated $11 billion needed to modernize transportation networks.

Learn more about China Pakistan here https://brainly.com/question/17737838

#SPJ10

Which is the preferred means of trapping user input for errors?

Answers

Escaping is the preferred method used for trapping user inputs for errors.

HTML (HyperText Markup Language)

Most web pages users interact with today are designed based on the rules of HTML. In a web-based environment, a preferred means developers use to trap user input for errors is the escape string. This typically involves using mysql_real_escape_string() when coding.

You can learn more about escaping here https://brainly.com/question/14821549

#SPJ12

in the tcp/ip protocol that allows communication across the internet, what does tcp do?

Answers

TCP tells or state how applications can make channels of communication across a network.

What is the role of TCP?

TCP is known to often help in the management of how a message is put together into smaller packets before they are sent or transmitted over the internet and then put together again in the right way at the arriving or destination address.

Therefore, TCP tells or state how applications can make channels of communication across a network.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ11

Answer:

The TCP establishes a connection and a secure transmission between the client and the server.

Explanation:

It is designed to break things down as packets, then send it to the server as a request. The server will receive the request nd give you a response, initiating a connection between said services.

Hope this helps!

what is your first step in developing the database?

Answers

The first step in developing a database is simply to have a conversation (talk) to the employees or end users who will be using the database.

What is a database?

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

As a general rule, having a conversation (talk) to the employees or end users who will be using the database is the first step in developing a database.

Read more on database here: brainly.com/question/13179611

#SPJ12

When verifying sd-wan traffic routing with the cli packet capture tool, which verbosity level should you use?

Answers

The verbosity level that you should use is level 4.

What is a verbosity level?

It should be noted that verbosity level simply means logging in of information on a system.

When verifying sd-wan traffic routing with the cli packet capture tool, the verbosity level that you should use is level 4.

Learn more about verbosity on:

brainly.com/question/76327

#SPJ12

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

Explanation:

For Android products, your device will need to be running Nougat 7.1. 1 or newer.

when scrum team members meet and collaborate with each other to find the best way to build and deliver the software to the customer, which of the following agile values is being practiced?

Answers

The agile values is being practiced is Individuals and interactions over processes and tools.

What is individuals and interactions over processes and tools?

This is known to be a first value that is seen in the Agile Manifesto as it is “Individuals and interactions over processes and tools.”

Note that it place Value of people more highly instead of processes or tools and as such, The agile values is being practiced is Individuals and interactions over processes and tools.

Learn more about  scrum team  from

https://brainly.com/question/4763588

#SPJ11

What are 15 importance of information processing cycle?

Answers

Answer:

mark me as the brainliest

Explanation:Before you can start to learn about the different types of computers that you will come across, you need to understand the basics of how computers work. All computers, whether they are the smartphone in your hand or large, powerful servers, operate on the same five basic principles. These are input, processing, storage, output and communication. Each component of a computer performs one of these functions, but they all work together to make the computer work.

Answer:

Importance of information processing cycle are:

Explanation:

It provides meaningful information.It helps performers identify relevant cues via selective attention.It helps in increasing movement reactions which will lead ultimately to a successful outcome. It help enhance our ability to store more information in the long term memory is practiced.It provides students with more skills. It aims to explain how information is encoded into memory.It is based on the idea that humans do not merely respond to stimuli from the environment.It deals with large sums of data on a daily basis which is processed into information,etc.

Hope it helps!

In a job-order costing system, manufacturing overhead applied is recorded as a debit to:

Answers

In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.

What is Manufacturing overhead (MOH) cost?

This is known to be  the sum of all the indirect costs which is said to be often incurred while creating a product.

Note that in the case above, In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.

Learn more about costing system from

https://brainly.com/question/24516871

#SPJ12

Write a class with name shares shares( ) constructor to initialize the object shares(String , int , int ) constructor to initialize the object void buy( ) for buying the shares void sell( ) for selling the shares calc( ) to calculate the total value of shares show( ) to show the details. Note : buy( ) and sell( ) functions will increase or decrease the number of shares, and accordingly the Total value of shares will change. Create another class and write main( ) function and use the above functions....use : string nm(name of buyer)
int no(no. of shares)
int unitprc(price of 1 share)
int totalval (total value of all shares)

Answers

Explanation:

What is constructor?

Constructor is a member function of class, whose name is same as the class.

A constructor is a special type of member function of a class which initializes objects of a class. In C++, Constructor is automatically called when object(instance of class) is created.

Constructor is invoked at the time of object creation. It constructs the values i.e. provides data for the object that is why it is known as constructors.

Constructor does not have a return value, hence they do not have a return type.

impact of science in the world ​

Answers

Answer:

scientific impact reflection that finding all publication has on science or on society

Explanation:

such impact can be short term or long term and it is important not be imprise 1 over the other to great extent

Which of the following creates a security concern by using AutoRun to automatically launch malware?

Answers

Answer:

USB device

Explanation:

AutoRun automatically launches malicious software as soon as you insert a USB device

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

Answers

A content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

What is a content switch?

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

Thus, a content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

Read more on switches here: https://brainly.com/question/14850209

#SPJ12

True or false. A plug-in card is always required to support pc sound

Answers

Answer:

False

Explanation:

The motherboard chipset frequently provides false sound functionality. A sound card is a computer expansion device that receives and sends audio. Software programs and device drivers are used to configure and operate sound cards. The input device used to obtain audio data is typically a microphone, while the output devices are typically speakers or headphones. The Sound Card translates incoming digital audio data into analog audio for playback by the speakers. In the opposite instance, the sound card may convert analog audio data from the microphone to digital data that can be saved on a computer and transformed using audio software.

A plug-in card is always required to support a personal computer (PC) sound: False.

What is a hardware?

A hardware refers to a physical component of computer system that can be seen, programmed, and touched by the end users such as:

MotherboardKeyboardSpeaker

In Computer technology, sound functions in all personal computers (PCs) are often provided by the motherboard chipset. Thus, a plug-in card is not required to support sound in a personal computer (PC).

Read more on hardware here: brainly.com/question/959479

#SPJ12

Other Questions
1. Given the points A (2, 14) and B (17, -6).(a) Find the distance of the line AB.(b) Find the midpoint of the line AB. (c) Find the gradient of the line AB. (d) Find the equation of the line AB. (e) Find the equation of the line parallel to AB passing through the point (3,5).(f) Find the equation of the line perpendicular to AB passing through point (4,-2). (g) Draw the above 3 lines on a graph. Read each literary element. Then, sorth them by whether they belong to a story or a poem Discuss the role of television in the 1960 presidential election. How does television influence the political scene today?. What is the equation of the directrix of the parabola given by the equation y2 = -24x? Question 2How did Spain maintain its empire? A solid right pyramid has a regular hexagonal base with an area of 7.4 units2. The pyramid has a height of 6 units. which animals has a better chance of survival fox or leopard. why?? B is the set of odd numbers greater than 5 and less than 21 The base of the pyramid is a rectangle that is not asquare. Which statements correctly describe thesymmetry of the pyramid? Check all that apply.The pyramid has four planes of symmetry.O The pyramid has two planes of symmetry.An axis of symmetry passes through the vertex andis perpendicular to the base.An axis of symmetry passes through the vertex andthrough one of the triangular faces of the pyramid.An angle that measures 90 is an angle of rotationfor an axis of symmetry for the pyramid.An angle that measures 45 is an angle of rotationfor an axis of symmetry for the pyramid. Find the solution:3x + 2y = 12-2x + 3y = 5 Find the measure of angleAEC. What embyonic germ layer gives rise to nervous tissue? Where a solid wood door is installed as a permitted opening between a garage and a residence, the minimum thickness of the door shallbe __________ inches. Jaronda is a member of a dance team. As a fundraiser, she and the other members of the team decide that she will use the teams money to buy flowers in bulk, sell the flowers individually to students with her schools permission, and return the teams money plus any profits she makes. What is the MOST accurate name for Jarondas role?A. project managerB. network facilitatorC. data managerD. systems operator When 50.5 g iron(III) oxide reacts with carbon monoxide, 32.2 g iron is produced. What is the percent yield of the reaction?Fe2O3(s)+3CO(g)2Fe(s)+3CO2(g) what is the difference between a relation and function? Classify each of the following as a function, or not a function. State the domain and range{(1,7),(1,14),(1,21)}The relation is/isn't a function Domain _ _ _Range _ _ _Leave Unused Fields Blank the equation of the line in the graph is y = (blank) x+ (blank) Disease cannot be transmitted through blood by:intravenous-drug use.body piercing.tattooing.protected contact. if f(x)=5^2x-2 and g(x)=x+1, find (f-g) (x) What is produced during the replacement reaction of ba(no3)2 and na2so4? 2bana 2no3so4 2nano3 baso4 nano3 baso4 bana2 (no3)2so4