The act of using someone else's identity for one's own ends is called ___________.

A. exposure
B. appropriation
C. insecurity
D. blackmail


Answer: B

Computer Science & Information Technology

You might also like to view...

Content from other Office programs can be copied and pasted into a PowerPoint presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

In Simple Markup view, what alerts a reader that edits have been made to a paragraph?

A) A red vertical bar on the left side of a paragraph B) Colored text in a paragraph, indicating the location of edits C) A comment that displays when you place the mouse pointer on an edited paragraph D) A comment balloon on the right side of a paragraph

Computer Science & Information Technology

A PowerPoint template contains the complete blueprint for slides pertaining to a specific kind of presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

Explain what a key object is

What will be an ideal response?

Computer Science & Information Technology