Accessing a computer system without permission is an example of ______.

A. cyberstalking
B. hacking
C. harrassment
D. cyberbullying


B. hacking

Criminal Justice

You might also like to view...

In 1965, the Supreme Court held in ______ v. Texas, that the defendant was deprived of his right to due process where his criminal trial was televised

Fill in the blank(s) with correct word

Criminal Justice

The use of some pretense to get a suspect to leave a barricaded location without the need for a tactical entry is commonly called a ______

Fill in the blank(s) with the appropriate word(s).

Criminal Justice

Identify which of the following cases started the moratorium on the death penalty.

A. Furman v. Georgia B. Gregg v. Georgia C. Atkins v. Virginia D. Roper v. Simmons

Criminal Justice

Inmates sentenced to jail usually have a sentence of ________ or less.

Fill in the blank(s) with the appropriate word(s).

Criminal Justice