Jim asks Tim to log into his account on his work computer. As Tim types his password, Jim watches him and quickly writes down his password in order to log into his account later. This is called ______.

A. skimming
B. phishing
C. dumpster diving
D. shoulder surfing


D. shoulder surfing

Criminal Justice

You might also like to view...

Traditionally, psychological research has

a) focused on the normal person. b) concentrated on risk factors that lead to maladjustment and problem behavior. c) focused on human adaptation and development. d) concentrated on studying juvenile delinquents.

Criminal Justice

The FLSA's overtime provisions apply to all persons employed in a police department in a bona fide executive, administrative, or professional capacity

Indicate whether the statement is true or false

Criminal Justice

The first Supreme Court decision that clearly established an exclusionary rule under the Fourth Amendment was

A. Boyd v. U.S. (1886) B. Adams v. New York (1904) C. Weeks v. U.S. (1914) D. Silverthorne Lumber Co. v. U.S. (1920)

Criminal Justice

The ________ model of criminal justice is based on the realization that a large percentage of criminal cases reported to the police do not result in the conviction and incarceration of an offender.

A. funnel B. wedding cake C. crime control D. due process

Criminal Justice