What is a scheme perpetrated over the Internet or by email that tricks a victim into voluntarily and knowingly giving money or property to a person?

a. Phishing
b. Pharming
c. Computer fraud


C. Computer fraud

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ name is a key component of e-mail addresses and Web site addresses.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Notes content that is no longer accurate or relevant.

a. Del element b. Small element c. S element d. Br element

Computer Science & Information Technology

Storage specifier _________ allows a member of a const object to be modified.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following galleries with their descriptions:

I. Theme gallery II. Colors gallery III. Theme Fonts gallery IV. Effects gallery V. Background Styles gallery A. includes soft glow, shadows, and three-dimensional B. includes checks, stripes, blocks, and dots C. pairs title text with body text D. eight options viewable from the Design tab; click More for the full gallery E. part of a theme design that defines a set of shades for all slides

Computer Science & Information Technology