Making Internet data appear to come from one place when it is really coming from another is known as ________.

a. Forgery
b. Data diddling
c. Salami shaving
d. Shilling

Ans: a. Forgery

Computer Science & Information Technology

You might also like to view...

Which of the following fire suppression systems should be used in case of a paper or wood fire?

a. Class A b. Class B c. Class C d. Class D

Computer Science & Information Technology

Security-level rules enable you to set a default policy and create exceptions. You can select from the ________ security level, which allows software to run according to a user's access rights

a. Disallowed b. Basic user c. Power user d. None of the above

Computer Science & Information Technology