A message used to trick someone into divulging their private information is called ________

A) phishing B) fraud C) identity theft D) POD


A

Computer Science & Information Technology

You might also like to view...

A can be enhanced by adding reusable controls such as Buttons.

a) component b) Form c) icon d) property

Computer Science & Information Technology

A common use for ________ numbers is to represent colors on web pages

Fill in the blank(s) with correct word

Computer Science & Information Technology

Each author is uniquely identified by his or her AUTHOR_NUM.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Mesh points are ____________________-shaped.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology