Which of the following is NOT an example of a computer crime?
A. theft of time and service
B. entering incorrect data
C. pirating software
D. online service fraud
Answer: B. entering incorrect data
You might also like to view...
Which of the following documents would look best in landscape orientation?
A) A certificate B) A letter C) A memo D) A resume
Which of the following is a control - such as a check box or button - that offers options to users or runs macros or scripts that automate a task?
A) DeveloperX control B) AJAX control C) ActiveX control D) VBA control
Which of the following is a configuration option for the ping command?
A) The IP address of the destination B) The timeout for an echo reply C) The route to take D) The default gateway of the first hop
What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords??
A. salted passwords B. ?scrambled passwords C. ?indexed passwords D. master passwords