Author Question: __________ involves using official-looking e-mail messages to steal valuable information. a. ... (Read 22 times)

Zoey63294

  • Hero Member
  • *****
  • Posts: 539
__________ involves using official-looking e-mail messages to steal valuable information.
 
  a. Cloning
  b. Phishing
  c. Phreaking
  d. Softlifting

Question 2

Using a computer to create a database to support drug distribution falls into which category of cybercrime?
 
  a. Internal cybercrime
  b. Computer-manipulation crime
  c. Support of criminal enterprises
  d. Telecommunications crimes



cpetit11

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Answer: b

Answer to Question 2

Answer: c



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The horizontal fraction bar was introduced by the Arabs.

Did you know?

Approximately 15–25% of recognized pregnancies end in miscarriage. However, many miscarriages often occur before a woman even knows she is pregnant.

Did you know?

Most women experience menopause in their 50s. However, in 1994, an Italian woman gave birth to a baby boy when she was 61 years old.

Did you know?

On average, someone in the United States has a stroke about every 40 seconds. This is about 795,000 people per year.

Did you know?

Each year in the United States, there are approximately six million pregnancies. This means that at any one time, about 4% of women in the United States are pregnant.

For a complete list of videos, visit our video library