What is a high tech version of trying to get someone’s personal information called?

a. Cruising
b. Scamming
c. Prying
d. Phishing


d. Phishing

Education

You might also like to view...

In an effort to understand what they aren't able to understand in any other way, all societies and cultures throughout history have developed systems of beliefs about life, its origins, why they were here and what happens to them after they die

The cognitive learning principle that best explains why societies and cultures would make these efforts is: a. learning and development depend on experience. b. people want their experiences to make sense. c. knowledge people construct depends on what they already know. d. social interaction facilitates learning.

Education

Student writing characterized by squiggles and random markings is considered to be at the ________ stage

A) preliterate B) partially literate C) formal literate D) emerging literate

Education

Examples of academic dishonesty include:

A. Obtaining unauthorized information B. Tendering of information C. Misrepresentation D. Bribery and plagiarism E. All of the above

Education

Which of the following behavior expectations is stated correctly?

a. Show respect for your peers in this activity. b. In this lesson, being responsible means starting your work immediately. c. Follow the rule “Be Safe” when using the science equipment. d. All of the above.

Education