____ and black hat hacker are terms used to describe a criminal or unethical hacker.

A. Client
B. Aggregator
C. Cracker
D. Accelerator


Answer: C

Computer Science & Information Technology

You might also like to view...

Microsoft Word has a built-in thesaurus that enables you to look up ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Wiles and Reyes identified four operational aspects of a working forensic operation that must be planned. Which of the following is not one of those aspects?

a. Business Operations b. Technology Operations c. Scientific Practice d. Artistic Expression e. All four of these are considered.

Computer Science & Information Technology

The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which feature enables you to configure a large range of mostly display-related options, such as color and appearance of windows, desktop background, screen saver, and Windows themes?

a. Personalization b. Display c. Ease of Access Center d. Folder Options

Computer Science & Information Technology