The technique used to trick computer users into disclosing personal or financial information through an email message or a website is called ________
A) phishing B) browsing C) pharming D) surfing
A
Computer Science & Information Technology
You might also like to view...
When you create a new database, Access creates an empty table called Table1.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Draw a hierarchy for the components you might find in a graphical user interface. Note that some components can trigger actions. Some components may have graphics associated with them. Some components can hold other components.
What will be an ideal response?
Computer Science & Information Technology
The action of holding down the left mouse button while moving your mouse is called:
a. aligning b. editing c. dragging
Computer Science & Information Technology
Each CSS property can be formatted with different values, depending on the property.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology