F. Which of the following best describes identity theft?
A. Stealing another person's material and claiming it as your own.
B.
Stealing someone's personal information and using that information to commit theft or
fraud.
C. Examining material, such as online content, and blocking or deleting anything
considered inappropriate.
D. Software that can capture private information, such as e-mail messages, usernames,
passwords, bank
account information, and credit card information.