A person who uses one computer to break into another is called a:

a. cyberbully
b. hacker
c. botnet
d. cyberstalking


B

Criminal Justice

You might also like to view...

Pepinsky (1999) sees two contrary approaches toward social control in the forms of ______.

a. imperatives and hypotheticals b. making and keeping c. war making and peacemaking d. rights and responsibilities

Criminal Justice

Is criminology a science? Discuss and defend your view.

What will be an ideal response?

Criminal Justice

Litigation support software is designed to assist attorneys in organizing and presenting their cases

a. True b. False

Criminal Justice

Which of the following is true about home invasion robberies?

a. The offenders frequently target residents unknown to them, but whose lifestyle of habits they may know b. The targets are usually senior citizens and women living alone c. Invaders plan their attacks well in advance by following a target home from work for a period of time d. All of the above

Criminal Justice