Trying to trick users into revealing personal information by taking on the appearance of a trusted source is known as ________

Fill in the blank(s) with correct word

phishing

Computer Science & Information Technology

You might also like to view...

Reports can be based on tables and ________

A) subforms B) macros C) forms D) queries

Computer Science & Information Technology

The sequence of locations in a hash table that a collision resolution scheme examines is known as a(n) ______ sequence.

a) iteration b) hash c) collision d) probe

Computer Science & Information Technology