Author Question: __________ involves using official-looking e-mail messages to steal valuable information. a. ... (Read 55 times)

Zoey63294

  • Hero Member
  • *****
  • Posts: 539
__________ involves using official-looking e-mail messages to steal valuable information.
 
  a. Cloning
  b. Phishing
  c. Phreaking
  d. Softlifting

Question 2

Using a computer to create a database to support drug distribution falls into which category of cybercrime?
 
  a. Internal cybercrime
  b. Computer-manipulation crime
  c. Support of criminal enterprises
  d. Telecommunications crimes



cpetit11

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Answer: b

Answer to Question 2

Answer: c



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In the United States, an estimated 50 million unnecessary antibiotics are prescribed for viral respiratory infections.

Did you know?

There used to be a metric calendar, as well as metric clocks. The metric calendar, or "French Republican Calendar" divided the year into 12 months, but each month was divided into three 10-day weeks. Each day had 10 decimal hours. Each hour had 100 decimal minutes. Due to lack of popularity, the metric clocks and calendars were ended in 1795, three years after they had been first marketed.

Did you know?

Bacteria have flourished on the earth for over three billion years. They were the first life forms on the planet.

Did you know?

About 3.2 billion people, nearly half the world population, are at risk for malaria. In 2015, there are about 214 million malaria cases and an estimated 438,000 malaria deaths.

Did you know?

Complications of influenza include: bacterial pneumonia, ear and sinus infections, dehydration, and worsening of chronic conditions such as asthma, congestive heart failure, or diabetes.

For a complete list of videos, visit our video library