Case 5-2
Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.
A. ?phishing
B. ?piggybacking
C. ?war driving
D. ?social media hacking
Answer: A
Computer Science & Information Technology
You might also like to view...
A(n) _______________________ is a graphical window that pops up on top of any currently active window so that the user can interact with it.
a) component b) dialog box c) event d) listener e) none of the above
Computer Science & Information Technology
An __________ allows selection of a contiguous range of items in the list.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Because of Twitter's public nature, you need to be ________ about the type of information you post to Twitter
Fill in the blank(s) with correct word
Computer Science & Information Technology
____ uses different shades of gray in an image.
a. Gradient mode b. Grayscale mode c. Shading mode d. none of the above
Computer Science & Information Technology