Using a wireless network without the network owner's permission is known as ________.

A. hijacking
B. spamming
C. piggybacking
D. phishing


Answer: C

Computer Science & Information Technology

You might also like to view...

The value stored in the Text property is treated as alphanumeric text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Microsoft Office database program is called Outlook

Indicate whether the statement is true or false

Computer Science & Information Technology

The Date and Time button is found in the Header/________ group on the Design tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

In ________, the ribbon and shortcut menus are enlarged to make selecting commands with your fingertip easier

Fill in the blank(s) with correct word

Computer Science & Information Technology