A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A. e-cons
B. e-scams
C. dot frauds
D. dot cons


Answer: D

Computer Science & Information Technology

You might also like to view...

You can use _____ type(s) of graphics to enhance documents created with Microsoft Word.

A. one B. three C. two D. many

Computer Science & Information Technology

An implementation of the _________ interface configures the database connection and prepares query statements automatically.

a. ResultSet b. RowSet c. Both of the above d. Neither of the above

Computer Science & Information Technology

What is the output from System.out.println((int)Math.random() * 4)?

a. 0 b. 1 c. 2 d. 3 e. 4

Computer Science & Information Technology

Use the ________ to make sure your files are backwardly compatible.

What will be an ideal response?

Computer Science & Information Technology