____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.
Fill in the blank(s) with the appropriate word(s).
Phishing
Computer Science & Information Technology
You might also like to view...
Which layer enables reliable transmission of data through the Physical layer at the sending end, and checks such reliability upon reception at the receiving end?
A. Data Link layer B. Physical layer C. Network layer D. Presentation layer
Computer Science & Information Technology
A file that contains one or more worksheets is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
All of the following could set up an e-mail account EXCEPT ____.
A. your employer B. your school C. Google's Gmail D. Windows Explorer
Computer Science & Information Technology
The logic for the stack top is virtually identical to that for the pop stack except for the delete logic.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology