_______ scams use email to try and trick you into revealing personal information, usually on the pretense of being your bank.

A. Phishing
B. Cookie
C. Spyware
D. Adware


Answer: A

Computer Science & Information Technology

You might also like to view...

The three main types of intellectual property for which legal protection is available are: copyrights, patents, and _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Excel automatically determines the starting, incremental, and stopping values on a chart based on the data selected

Indicate whether the statement is true or false

Computer Science & Information Technology

If a date is typed as 7-6-14, Excel will complete it as ________

A) Jul-6-14 B) Jul-14 C) 6-Jul-14 D) 7/6/2014

Computer Science & Information Technology

Which of these is a requirement for running DirectAccess?

a. The client computer must be running Windows 7 (any version). b. The server must be running Windows Server 2008 R2. c. The HomeGroup must be the same on the client and the server. d. All of the above.

Computer Science & Information Technology