Case 5-2
Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.

A. ?phishing
B. ?piggybacking
C. ?war driving
D. ?social media hacking


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) _______________________ is a graphical window that pops up on top of any currently active window so that the user can interact with it.

a) component b) dialog box c) event d) listener e) none of the above

Computer Science & Information Technology

An __________ allows selection of a contiguous range of items in the list.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Because of Twitter's public nature, you need to be ________ about the type of information you post to Twitter

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ uses different shades of gray in an image.

a. Gradient mode b. Grayscale mode c. Shading mode d. none of the above

Computer Science & Information Technology