A person that secretly peaks at your monitor screen while you work may be doing what?
tailgating
screen capping
shoulder surfing
social engineering
shoulder surfing
Computer Science & Information Technology
You might also like to view...
Which of the following is used to uniquely identify a computer on a network?
A. network ID B. ARP address C. IP address D. Serial number
Computer Science & Information Technology
The file extension for a Rich Text Format file is slx
Indicate whether the statement is true or false
Computer Science & Information Technology
Give a specific reason as to why would you use a named data macro
What will be an ideal response?
Computer Science & Information Technology
Copyright protection lasts 20 years after the date of publication or release.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology