Email messages and instant messages that appear to be from those you do business with, designed to trick you into revealing information, such as usernames and passwords for your accounts.

A. Malware
B. Pharming
C. Phishing


C. Phishing

Computer Science & Information Technology

You might also like to view...

Countering efforts by foreign countries to steal our nation's secrets, evaluating the capabilities of terrorists in a digital age, and ____ are the FBI's highest priorities.

A. investigating crimes involving foreign currency B. arresting local bank robbers C. fighting cyber crime D. murder

Computer Science & Information Technology

You can browse through the Help Table of Contents to display information about a particular topic or to familiarize yourself with an Office program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which installation would support full use of 6GB of RAM?

A) 32-bit Windows XP Professional B) Windows 7 Home Premium x64 C) Windows Vista Ultimate x86 D) 48-bit Windows 7 Home Basic

Computer Science & Information Technology

FlowLayout is ________.

a. an abstract class b. a way of organizing components vertically c. the simplest layout manager d. left-aligned by default

Computer Science & Information Technology