Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair?

a. criminal record identity theft/fraud
b. assumption of identity
c. credit or financial theft
d. virtual identity theft/fraud


Answer: d

Computer Science & Information Technology

You might also like to view...

A meaningful name for a function

a. makes the code easier to read b. raises the level of understanding for those who read the code c. means as much to the computer as a meaningless name d. all of the above

Computer Science & Information Technology

The ________ is the measurement of the maximum speed at which data travels between computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ refers to a new use of existing technologies.

A. XML B. PHP C. AJAX D. JavaScript

Computer Science & Information Technology

Imagine that you have a list of the genders (as single characters) of all the students in your class, in order of their last name. The list will look something like “MFFMMMFFMFMMFFFM” where M is male and F is female. Write a function (below) percentageGenders(string) to accept a string that represents the genders. You are to count all of the M’s and F’s in the string and print out the ratio (as a decimal) of the each gender. For example, if the input string were “MFFF,” then the function should print something like, “There are 0.25 males, 0.75 females.” (Hint: Better multiply something by 1.0 to make sure that you get floats not integers.)

What will be an ideal response?

Computer Science & Information Technology