Using a wireless network without the network owner's permission is known as ________.
A. hijacking
B. spamming
C. piggybacking
D. phishing
Answer: C
Computer Science & Information Technology
You might also like to view...
The value stored in the Text property is treated as alphanumeric text.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Microsoft Office database program is called Outlook
Indicate whether the statement is true or false
Computer Science & Information Technology
The Date and Time button is found in the Header/________ group on the Design tab
Fill in the blank(s) with correct word
Computer Science & Information Technology
In ________, the ribbon and shortcut menus are enlarged to make selecting commands with your fingertip easier
Fill in the blank(s) with correct word
Computer Science & Information Technology