____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.

Fill in the blank(s) with the appropriate word(s).


E-mail spoofing

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Under MS-DOS, IO.SYS is responsible for directory management. 2. When a disk file is first opened, IO.SYS calls MSDOS.SYS to read the directory. 3. Under MS-DOS, IO.SYS is responsible for allocating space on disk. 4. Under MS-DOS, the BIOS contains an entry for each cluster on the disk.

Computer Science & Information Technology

Apache OpenOffice is the standard in the business environment for office applications

Indicate whether the statement is true or false

Computer Science & Information Technology

________ is a common image editing tool in Windows 8

A) Paint B) WordPad C) Excel D) Snip

Computer Science & Information Technology

The ________ contains frequently used commands and allows users to add or delete commands to suit their needs

A) address bar B) mini toolbar C) shortcut menu D) Quick Access Toolbar

Computer Science & Information Technology