The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.

Fill in the blank(s) with the appropriate word(s).


phishing

Computer Science & Information Technology

You might also like to view...

One method that is useful for creating an orderly appearance when you have multiple objects is to use one of PowerPoint's ____ commands.

A. arrange B. distribute C. order D. align

Computer Science & Information Technology

Describe one method to secure NFS.

What will be an ideal response?

Computer Science & Information Technology

Which of the following includes diagrams of individual structured cabling connections, including the actual designation for each cable run, such as the wiring details for an EIA/TIA 568B connection?

A. configuration management B. network diagram C. wiring scheme D. network map

Computer Science & Information Technology

Case 4-1 Brian is trying his best to understand the concept of variable scope, so he calls his friend Molly for guidance. Brian has defined a variable named strNumberOfSongs within the click event handle for a Submit button, and he has been frustrated in his efforts to refer to this variable in the click event handler for a Clear button. What does Molly tell him is going on?

A. The variable strNumberOfSongs has no scope. B. The variable strNumberOfSongs is a local variable. C. The variable strNumberOfSongs was not declared correctly. D. The variable strNumberOfSongs is a global variable.

Computer Science & Information Technology