____________ attempt to find weaknesses in software and work their way past these to achieve their goals.
a. Data spies
b. Crackers
c. Hardware thieves
d. Hackers
b. Crackers
Computer Science & Information Technology
You might also like to view...
A __________ menu first displays the main menu and then, based on the user's selection, displays a submenu.
a. single-level b. multiple-level c. step-level d. sub-level
Computer Science & Information Technology
Which of the following is a less common data field in a recipient list?
A) first name B) phone number C) last name D) date of birth
Computer Science & Information Technology
Which of the following should be done to maintain and harden a hard disk? (Select the two best answers.)
A. Defragment the drive. B. Consider a whole disk encryption. C. Install third-party applications. D. Sanitize the drive.
Computer Science & Information Technology
To remove unwanted parts of an image, use the _____ option.
A. crop B. delete C. resize D. chop
Computer Science & Information Technology