A scheme perpetrated over the Internet or by email that tricks a victim into voluntarily and knowingly giving money or property to a person is ________.
When creating a data warehouse, ________ is the process that extracts data from source databases, reformats the data, and stores them in the warehouse.
Match each of the following terms to its definition:I.copyleftII.sampling rateIII.trademarkIV.fair useV.digital rights managementA.granting of certain rights to a work while retaining other rightsB.allows only limited use of legally purchased materialsC.allows McDonalds to protect its logoD.allows people to use portions of a copyrighted work for specific purposesE.number of times an analog wave is measured