Match the following terms with their description

I. Cybercrime
II. Phishing
III. Pharming
IV. Hacking
V. Hacktivism

A. Gaining unauthorized access to a computer system or network
B. Generally used to make a political statement
C. Criminal activity on the Internet
D. Messages designed to trick you
E. Redirects you to a phony website


C, D, E, A, B

Computer Science & Information Technology

You might also like to view...

Use the fill algorithm to fill the entire array of strings named items with "hello".

What will be an ideal response?

Computer Science & Information Technology

Objects in the Hit frame are always visible on the Stage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The sound in Dolby's eighth channel is sent to a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is true of named anchor names?

A. You can use special characters in anchor names. B. You should begin an anchor name with a number. C. You can use spaces in anchor names. D. None of the above

Computer Science & Information Technology