In the past, which term was commonly used to refer to a person who uses advanced computer skills to attack computers?

A. slacker
B. hacker
C. white-hat
D. black-hat


Answer: B

Computer Science & Information Technology

You might also like to view...

List three query design guidelines that can help reduce demands on the physical resources while providing an improvement in performance.

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements are correct?

a. char[][][] charArray = new char[2][2][]; b. char[2][2][] charArray = {'a', 'b'}; c. char[][][] charArray = {{'a', 'b'}, {'c', 'd'}, {'e', 'f'}}; d. char[][][] charArray = {{{'a', 'b'}, {'c', 'd'}, {'e', 'f'}}};

Computer Science & Information Technology

Create a view to include all employee information, but hide salary and commission.

Use case study databases for the following queries.

Computer Science & Information Technology

The structure that takes one of two paths based on a decision is called a(n) ____ structure.

A. if-then B. if-else C. if-then-else D. if-endif

Computer Science & Information Technology