____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.

Fill in the blank(s) with the appropriate word(s).


Phishing

Computer Science & Information Technology

You might also like to view...

Which layer enables reliable transmission of data through the Physical layer at the sending end, and checks such reliability upon reception at the receiving end?

A. Data Link layer B. Physical layer C. Network layer D. Presentation layer

Computer Science & Information Technology

A file that contains one or more worksheets is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

All of the following could set up an e-mail account EXCEPT ____.

A. your employer B. your school C. Google's Gmail D. Windows Explorer

Computer Science & Information Technology

The logic for the stack top is virtually identical to that for the pop stack except for the delete logic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology