________ is a form of fraud in which one person pretends to be someone else

A) Spyware
B) Cyberbullying
C) Malware
D) Identity theft

D

Computer Science & Information Technology

You might also like to view...

The ________ is used to setup a maintenance plan for running system tools

Fill in the blank(s) with correct word

Computer Science & Information Technology

Click the ____________________ button at the bottom of the Styles task pane to create a new style.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology