Which of the following is NOT an example of a computer crime?

A. theft of time and service
B. entering incorrect data
C. pirating software
D. online service fraud


Answer: B. entering incorrect data

Computer Science & Information Technology

You might also like to view...

Which of the following documents would look best in landscape orientation?

A) A certificate B) A letter C) A memo D) A resume

Computer Science & Information Technology

Which of the following is a control - such as a check box or button - that offers options to users or runs macros or scripts that automate a task?

A) DeveloperX control B) AJAX control C) ActiveX control D) VBA control

Computer Science & Information Technology

Which of the following is a configuration option for the ping command?

A) The IP address of the destination B) The timeout for an echo reply C) The route to take D) The default gateway of the first hop

Computer Science & Information Technology

What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords??

A. salted passwords B. ?scrambled passwords C. ?indexed passwords D. master passwords

Computer Science & Information Technology