________ is a form of fraud in which one person pretends to be someone else
A) Spyware
B) Cyberbullying
C) Malware
D) Identity theft
D
Computer Science & Information Technology
You might also like to view...
The ________ is used to setup a maintenance plan for running system tools
Fill in the blank(s) with correct word
Computer Science & Information Technology
Click the ____________________ button at the bottom of the Styles task pane to create a new style.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology