No student devices needed. Know more
20 questions
unlawful acts where the computer is either a tool or a target or both
cybercrime
trojan horse
malware
hacking
software designed to infiltrate or damage a computer system without the owner's consent
virus
phishing
bots
malware
a program that attaches itself to a computer or a file and then circulates to other files and to other computers on a network
worm
virus
trojan horse
webjacking
a program that copies itself.
worm
virus
malware
hacking
a deceptively labeled program that contains at least one function that is unknown to the user and that harms the user.
virus
worm
trojan horse
nigerian letter scheme
attempting to steal personal information by sending out e-mails that appear to come from legitimate websites
phishing
pharming
webjacking
zombies
programs that provide attackers with unauthorized control of a computer
pharming
phishing
zombies
bots
redirecting users to false websites without them knowing it
phishing
pharming
bots
zombies
when a hacker gains access to and control over the website of another user
hacking
malware
webjacking
spoofed websites
a recipient is offered the opportunity to share in a percentage of millions of dollars if they first front some of their own money
trojan horse
nigerian letter scheme
zombies
cybercrime
imitations of true legitimate sites
webjacking
spoofed websites
crimeware
bots
when a computer is flooded with more requests than it can handle causing it to crash
crimeware
piracy
spam
DOS
the act of stealing valuable property by copying software, music, graphics, pictures, movies and books that are available on the internet
crimeware
spam
piracy
copyright
the legal right of ownership of work produced in books. music, and computer software
crimeware
piracy
copyright
none of the other answers
Explore all questions with a free account