A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers.

A. ?zombie
B. ?cracker
C. ?script kiddie
D. ?whacker


Answer: B

Computer Science & Information Technology

You might also like to view...

In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.

What will be an ideal response?

Computer Science & Information Technology

How would you use ssh to run xterm on plum and show the display on the local system?

What will be an ideal response?

Computer Science & Information Technology

The ____________________ of the drag as you create a path line determines how much influence the anchor point will have over the curve.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The accompanying figure shows a complete URL for a website.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology