Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called __________
........ is one reason for problems of data integrity.
A hacker contacts you my phone or email and attempts to acquire your password_________
GUID/UUID is a ______ integer number used to identify resources
Spam over Internet telephony is known as ____________
Codes consisting of lines of varying widths or lengths that are computer-readable are known as______
A type of phishing attack where mobile phone users receive text messages containing a Web site hyper link is called ________
A virus _______is a false warning about a computer virus.
________ is a mechanism for improving the time it takes to read from or write to a hard disk.
Which of the following is a type of malware that is designed to change your browser's settings?