Author Question: __________ involves using official-looking e-mail messages to steal valuable information. a. ... (Read 41 times)

Zoey63294

  • Hero Member
  • *****
  • Posts: 539
__________ involves using official-looking e-mail messages to steal valuable information.
 
  a. Cloning
  b. Phishing
  c. Phreaking
  d. Softlifting

Question 2

Using a computer to create a database to support drug distribution falls into which category of cybercrime?
 
  a. Internal cybercrime
  b. Computer-manipulation crime
  c. Support of criminal enterprises
  d. Telecommunications crimes



cpetit11

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Answer: b

Answer to Question 2

Answer: c



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

According to the American College of Allergy, Asthma & Immunology, more than 50 million Americans have some kind of food allergy. Food allergies affect between 4 and 6% of children, and 4% of adults, according to the CDC. The most common food allergies include shellfish, peanuts, walnuts, fish, eggs, milk, and soy.

Did you know?

Human stomach acid is strong enough to dissolve small pieces of metal such as razor blades or staples.

Did you know?

In 1886, William Bates reported on the discovery of a substance produced by the adrenal gland that turned out to be epinephrine (adrenaline). In 1904, this drug was first artificially synthesized by Friedrich Stolz.

Did you know?

Cyanide works by making the human body unable to use oxygen.

Did you know?

The lipid bilayer is made of phospholipids. They are arranged in a double layer because one of their ends is attracted to water while the other is repelled by water.

For a complete list of videos, visit our video library