A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

a. hacker
b. insider
c. cracker
d. script bunny


Ans: c. cracker

Computer Science & Information Technology

You might also like to view...

What code may be filled in the blank without causing syntax or runtime errors:

``` public class Test { java.util.Date date; public static void main(String[] args) { Test test = new Test(); System.out.println(_________________); } }``` a. test.date b. date c. test.date.toString() d. date.toString()

Computer Science & Information Technology

In Windows, pressing ____ is the fastest and easiest way to duplicate a layer.

A. [Ctrl][J] B. [Ctrl][C] C. [Ctrl][D] D. [Ctrl][A]

Computer Science & Information Technology

Which of the following commands is a powerful enumeration tool included with Windows?

A. NessusWX B. Nbtstat C. NetDDE D. Netmon Agent

Computer Science & Information Technology

A(n) __________ constant is a named constant that is available to every module in the program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology