________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network

A) Phishing B) Cyberbullying C) Spoofing D) Pharming

A

Computer Science & Information Technology

You might also like to view...

Which of the following is not considered to be a Traditional methodology?

A. Waterfall B. Iterative C. Spiral D. Agile

Computer Science & Information Technology

You can rotate an object manually by dragging the bevel cube.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology