Theft of information, use of a computer to commit sabotage or embezzlement, and fraudulent use of a computer are examples of ____.

A. waste of resources
B. piracy
C. viruses
D. computer crimes


Answer: D

Computer Science & Information Technology

You might also like to view...

Discovery of the pattern of traffic between parties is a __________ attack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The dictionary is a research tool that provides a list of words with the same meaning

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is not one of the three categories that cloud services typically fall into?

infrastructure services application services maintenance services platform and development services

Computer Science & Information Technology

A company wants to secure its WAPs from unauthorized access. Which of the following is the MOST secure wireless encryption method?

A. SSID disable B. SNMPv3 C. WEP D. WPA2

Computer Science & Information Technology