________ is the use of a secret operative, on Internet auction sites, who bids on another seller's item to drive up the price.

a. Forgery
b. Data diddling
c. Salami shaving
d. Shilling


Ans: d. Shilling

Computer Science & Information Technology

You might also like to view...

Method getSelectedIndex of class JComboBox returns:

a. the index of the selected item in the JComboBox. b. the selected item in the JComboBox, as a String. c. the index of the previously selected item. d. None of the above.

Computer Science & Information Technology

A(n) ________ slide show is a presentation within a presentation in which several slides are grouped to be shown to a specific audience

Fill in the blank(s) with correct word

Computer Science & Information Technology

The anchor elements in a document can be referenced by the ____ property.

A. anchors[] B. anchor C. body D. a[]

Computer Science & Information Technology

An ATM that limits what kinds of transactions a user can perform is an example of which type of access control?

A. content-dependent B. constrained user interface C. temporal isolation D. nondiscretionary

Computer Science & Information Technology