If someone is ________, they are using an email message or a website to trick you into revealing your personal or financial information

A) trolling B) surfing C) phishing D) spamming


C

Computer Science & Information Technology

You might also like to view...

The SelectedItem property of a ListBox __________.

a. contains the index of the currently selected item b. contains the text of the currently selected item c. returns the location of the currently selected item d. returns -1 if no item is selected

Computer Science & Information Technology

Draw a UML class diagram showing an inheritance hierarchy containing classes that represent different types of trees (oak, elm, etc.). Show some appropriate variables and method names for at least two of these classes.

What will be an ideal response?

Computer Science & Information Technology

If users are sure the file is safe, they will need to click ________ to allow Access to fully open the database file to viewing and editing

Fill in the blank(s) with correct word

Computer Science & Information Technology

An optical drive random access time specification is the time it takes to find specific data

Indicate whether the statement is true or false

Computer Science & Information Technology