A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers.

A. ?zombie
B. ?cracker
C. ?script kiddie
D. ?whacker


Answer: B

Computer Science & Information Technology

You might also like to view...

Explain the use of leases in a discovery service to cope with the problem of service volatility.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is a very expensive form of high-speed storage?

A) Hard drive B) Cache and registers C) Storage D) RAM

Computer Science & Information Technology

When charting, the legend identifies colors assigned to each data:

A) type. B) axis. C) category. D) scale.

Computer Science & Information Technology

Each of these calculations, mean, median, and mode, attempt to define the ________ of a data set

Fill in the blank(s) with correct word

Computer Science & Information Technology