Which of the following is not true about computer crime?

a. Spyware is software that can collect your personal information, monitor your Web surfing habits, and then distribute this information to a third party.
b. Identity theft is one of the fastest growing crimes in the United States and the United Kingdom.
c. Malware is a general term that describes software designed to damage or infiltrate a computer system without the owner's consent or knowledge.
d. In a phishing attack, a "phisher" poses as a legitimate company, like a bank or credit agency, in an e-mail or
on a Web site in an attempt to obtain personal information


Answer: b. Identity theft is one of the fastest growing crimes in the United States and the United Kingdom.

Computer Science & Information Technology

You might also like to view...

What mode allows multiple users to open a database, but they cannot write any information to the database?

A. Open Read-Only B. Open Exclusive C. Open D. Open Exclusive Read-Only

Computer Science & Information Technology

When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.

What will be an ideal response?

Computer Science & Information Technology

A _____________ is the smallest data item in Access.

a. data point b. entry point c. record d. field

Computer Science & Information Technology

A(n) ____ key is a field with values that are used to sequence data.

A. identity B. composite C. alternate D. control

Computer Science & Information Technology