_________ is the theft of information located on or being sent from a computer or other device.
A. Data theft
B. Identity theft
C. Character theft
D. Cyber theft

Fill in the blank(s) with the appropriate word(s).


Data theft

Rationale: Data theft or information theft is the theft of data or information located on or being sent from a computer or other device. Common types of data and information stolen via the Internet or another network include customer data (such as Web site passwords or credit card information) and proprietary corporate information. See 6-4: Online Theft, Online Fraud, and Other Dot Cons

Computer Science & Information Technology

You might also like to view...

Lisa inserts her house address as the return addressat the bottom of any official document that she sends out. She formats this return address using bold and italic, centered, with a thin black line surrounding it. This formatted return address is referred to as a(n) _____.?

A. ?Indolent Part B. ?WordArt C. ?Quick Part D. ?SectionArt

Computer Science & Information Technology

____ Drawing mode assumes that the objects' path will combine in some fashion.

A. Object B. Merge C. Stroke D. Resolved

Computer Science & Information Technology

How do you create a sublayer?

What will be an ideal response?

Computer Science & Information Technology

________ is an open source operating system with hundreds of distributions that are available commercially or as a free download.

A. Linux B. Unix C. Mac OS D. Windows RT

Computer Science & Information Technology