______ involves obtaining usernames, passwords, and other personal information through trickery.

A. Phishing
B. Hacking
C. Sextortion
D. Spyware


A. Phishing

Criminal Justice

You might also like to view...

Problems in adoption law include:

A. Immediate placement B. Single home placements C. Support from natural parent D. Multiple home placements

Criminal Justice

Which of the following refers to the area of a computer that holds data during processing and is erased when power is shut down?

a. static memory b. primary storage c. volatile memory d. secondary storage

Criminal Justice

Public concern over juvenile crime helped reshape the philosophy of the juvenile justice system of which period?

A) Before the 1900s B) 1900-1960 C) 1960-1980 D) 1980-2000 E) 2000-present

Criminal Justice

What is the main criticism of restorative justice?

What will be an ideal response?

Criminal Justice