Actions ranging from creating viruses to disrupting computer networks are often referred to as:

A. scareware
B. social engineering
C. cybercrimes
D. data mining


Answer: C

Computer Science & Information Technology

You might also like to view...

12. In cell I9, create a formula without using a function that first adds the selected boxed set’s net weight (cell I8) to the packing weight (cell E5), and then divides the value by 16 to show the shipping weight in pounds.

Computer Science & Information Technology

_______ is the least desirable method of applying CSS to HTML because it mixes content (HTML) and presentation (CSS).

a. External style sheet b. Embedded style sheet c. Inline style d. Media-specific style sheets

Computer Science & Information Technology

To change the font, font size, and indentation of a footnote, you must change those settings within the ________ dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ attribute of the img element tells the browser where to find the coordinates for an image map

A) shapemap B) usemap C) coordmap D) findmap

Computer Science & Information Technology