Which of the following is the process to try to induce someone to provide you with personal information?

a. Cyberstalking
b. Looping
c. Phishing
d. Licensing


Answer C. One form of phishing is cross-site scripting, in which an attacker posts a script on an interactive website. This script redirects an unsuspecting user to a phishing website.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. When you overload an operator, you cannot change the number of operands taken by the operator. 2. A static member function cannot be called if no objects of the class exist. 3. The structure member selector operator . cannot be overloaded. 4. The this pointer is automatically passed to static member functions of a class. 5. A constructor that takes a single parameter of a type other than its class is called a convert constructor.

Computer Science & Information Technology

In addition to shading, you can also add ____ to text.

A. borders B. patterns C. gradients D. height

Computer Science & Information Technology

____________________ determine(s) the distance between the edge of the text and all four edges of the text box.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following commands deletes a view?

A. DELETE VIEW B. DROP VIEW C. REVOKE VIEW D. REMOVE VIEW

Computer Science & Information Technology