____________ attempt to find weaknesses in software and work their way past these to achieve their goals.

a. Data spies
b. Crackers
c. Hardware thieves
d. Hackers


b. Crackers

Computer Science & Information Technology

You might also like to view...

A __________ menu first displays the main menu and then, based on the user's selection, displays a submenu.

a. single-level b. multiple-level c. step-level d. sub-level

Computer Science & Information Technology

Which of the following is a less common data field in a recipient list?

A) first name B) phone number C) last name D) date of birth

Computer Science & Information Technology

Which of the following should be done to maintain and harden a hard disk? (Select the two best answers.)

A. Defragment the drive. B. Consider a whole disk encryption. C. Install third-party applications. D. Sanitize the drive.

Computer Science & Information Technology

To remove unwanted parts of an image, use the _____ option. 

A. crop B. delete C. resize D. chop

Computer Science & Information Technology