More cards in this set

Card 6

Front

Fraudsters try to get sensitive financial information?

Back

Preview of the front of card 6

Card 7

Front

Fake emails that copy a company (bank) with malware attachment?

Back

Preview of the front of card 7

Card 8

Front

Fraudsters create a file with highly sensitive info about victims of identity theft?

Back

Preview of the front of card 8

Card 9

Front

Who to call if you're a victim of Identity Theft?

Back

Preview of the front of card 9

Card 10

Front

Describe what an RSS feed does?

Back

Preview of the front of card 10

Card 11

Front

Spam email is an example of?

Back

Preview of the front of card 11

Card 12

Front

How does a search directory show it's search results?

Back

Preview of the front of card 12

Card 13

Front

Describe a jump-off site?

Back

Preview of the front of card 13

Card 14

Front

How are posts on a blog organised?

Back

Preview of the front of card 14

Card 15

Front

What does an academic e-journal provide?

Back

Preview of the front of card 15
View more cards