A person who uses one computer to break into another is called a:
a. cyberbully
b. hacker
c. botnet
d. cyberstalking
B
You might also like to view...
Pepinsky (1999) sees two contrary approaches toward social control in the forms of ______.
a. imperatives and hypotheticals b. making and keeping c. war making and peacemaking d. rights and responsibilities
Is criminology a science? Discuss and defend your view.
What will be an ideal response?
Litigation support software is designed to assist attorneys in organizing and presenting their cases
a. True b. False
Which of the following is true about home invasion robberies?
a. The offenders frequently target residents unknown to them, but whose lifestyle of habits they may know b. The targets are usually senior citizens and women living alone c. Invaders plan their attacks well in advance by following a target home from work for a period of time d. All of the above