________ uses email messages that appear to be from trusted websites to trick you into revealing personal information.

a. Phishing
b. Pharming
c. Spam
d. Botnet


a. Phishing

Computer Science & Information Technology

You might also like to view...

The architecture design process does not require the implementation of preliminary versions of user documentation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which class provides prebuilt dialog boxes that enable programs to display windows containing messages (such windows are called message dialogs)?

a. JDialogBox. b. JPrebuiltDialog. c. JMessageDialog. d. JOptionPane.

Computer Science & Information Technology

A bar tab aligns data at a decimal point

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ includes the functions of a power strip, surge suppressor, and battery power to allow users to save their work in the event of a loss of power

Fill in the blank(s) with correct word

Computer Science & Information Technology