Which of the following is the process to try to induce someone to provide you with personal information?
a. Cyberstalking
b. Looping
c. Phishing
d. Licensing
Answer C. One form of phishing is cross-site scripting, in which an attacker posts a script on an interactive website. This script redirects an unsuspecting user to a phishing website.
You might also like to view...
Answer the following statements true (T) or false (F)
1. When you overload an operator, you cannot change the number of operands taken by the operator. 2. A static member function cannot be called if no objects of the class exist. 3. The structure member selector operator . cannot be overloaded. 4. The this pointer is automatically passed to static member functions of a class. 5. A constructor that takes a single parameter of a type other than its class is called a convert constructor.
In addition to shading, you can also add ____ to text.
A. borders B. patterns C. gradients D. height
____________________ determine(s) the distance between the edge of the text and all four edges of the text box.
Fill in the blank(s) with the appropriate word(s).
Which of the following commands deletes a view?
A. DELETE VIEW B. DROP VIEW C. REVOKE VIEW D. REMOVE VIEW