What is war driving?

What will be an ideal response?


Unauthorized use of a Wi-Fi network is called war driving or Wi-Fi piggybacking, depending on the location of the hacker at the time. War driving typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to.

Computer Science & Information Technology

You might also like to view...

By default, a browser displays each ________ element on a new line.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If n is initialized to the value 5, the expression --n changes the value of n to ____.

A. 1 B. 4 C. 5 D. 6

Computer Science & Information Technology

To verify a Windows system meets the minimum processor and memory requirements to install software, use the ________.

a. System Settings window b. Apple menu c. File Explorer d. This PC window

Computer Science & Information Technology

Normally, statements in a program are executed one after the other in the order in which they are written. This is called __________ execution.

a) inline b) seeking c) ordered d) sequential

Computer Science & Information Technology