Author Question: __________ involves using official-looking e-mail messages to steal valuable information. a. ... (Read 17 times)

Zoey63294

  • Hero Member
  • *****
  • Posts: 539
__________ involves using official-looking e-mail messages to steal valuable information.
 
  a. Cloning
  b. Phishing
  c. Phreaking
  d. Softlifting

Question 2

Using a computer to create a database to support drug distribution falls into which category of cybercrime?
 
  a. Internal cybercrime
  b. Computer-manipulation crime
  c. Support of criminal enterprises
  d. Telecommunications crimes



cpetit11

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Answer: b

Answer to Question 2

Answer: c



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The tallest man ever known was Robert Wadlow, an American, who reached the height of 8 feet 11 inches. He died at age 26 years from an infection caused by the immense weight of his body (491 pounds) and the stress on his leg bones and muscles.

Did you know?

The modern decimal position system was the invention of the Hindus (around 800 AD), involving the placing of numerals to indicate their value (units, tens, hundreds, and so on).

Did you know?

The word drug comes from the Dutch word droog (meaning "dry"). For centuries, most drugs came from dried plants, hence the name.

Did you know?

Atropine was named after the Greek goddess Atropos, the oldest and ugliest of the three sisters known as the Fates, who controlled the destiny of men.

Did you know?

The calories found in one piece of cherry cheesecake could light a 60-watt light bulb for 1.5 hours.

For a complete list of videos, visit our video library