A ________ is someone who gains unauthorized access to computer systems.

A. cracker
B. hacker
C. cookie
D. logger


Answer: B

Computer Science & Information Technology

You might also like to view...

As a designer, you are constantly examining the fit between the ________, the ________, and the ________ set by the organization.

A) human; computer; tasks B) human; display; tasks C) designer; computer; tasks D) human; display; feedback

Computer Science & Information Technology

Most of the time your choice of a computer will come down to the computer's speed and your budget

Indicate whether the statement is true or false

Computer Science & Information Technology

The auditor or auditing committee's recommendations are typically followed by a specific set of ____ actions.

A. delivery B. dynamic C. remediation D. monitoring

Computer Science & Information Technology

AD FS is designed to work over the public Internet with a Web browser interface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology