Which of the following is the common name for the practice hackers use to trick people into revealing sensitive information?
Which of the following technologies can be used to create rollover images without the use of special plug-ins?