An e-mail-based scam that's designed to persuade you to reveal confidential information is called ____.
A. surfing
B. phishing
C. scanning
D. searching
Answer: B
Computer Science & Information Technology
You might also like to view...
The function that accepts a C-string containing a number as its argument and returns the integer equivalent is
a. strToInt b. itoa c. atoi d. int_from e. None of these
Computer Science & Information Technology
The ____________________ is a specification for the database fields and their characteristics.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Old-fashioned _________________________ advertising-telling friends, family, and other interested parties about your Web site-can be a free, helpful way to drive traffic to all types of Web sites.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
On what resource does a DMA attack focus?
A. CPU B. NIC C. memory D. hard drive
Computer Science & Information Technology