________ is the illegal use of email to scam users into surrendering their personal information, usually items like Social Security numbers, bank account numbers, and credit card numbers.

Fill in the blank(s) with the appropriate word(s).


phishing

Computer Science & Information Technology

You might also like to view...

When should a baseline be created/updated?

What will be an ideal response?

Computer Science & Information Technology

You are part of a testing team at a software business.  Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance.  You are doing _____ testing.

A. system testing B. volume testing C. acceptance testing D. integration testing

Computer Science & Information Technology

Certificates are issued by a trusted third party called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you click item G in the accompanying figure, a list of _______________ is displayed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology