In the context of computer crimes, those who cause problems, steal data, and corrupt systems are known as _____.

a. black hat hackers
b. white hat hackers
c. hacktivists
d. crackers


d. crackers
A cracker is an individual who causes problems, steals data, and corrupts systems. He or she possesses a high level of skill and knowledge with computers that enables him or her to interfere with the confidentiality of any information or security system.

Computer Science & Information Technology

You might also like to view...

Which of the following tools should you use to scan Unix systems?

A) NetStat Live B) Active Ports C) SATAN D) Cerberus

Computer Science & Information Technology

____ means, rather than executing the action by hand, you can simply tell Photoshop to apply the action to a folder of images.

A. Group process B. Batch process C. Process whole D. Time batch

Computer Science & Information Technology

What is the efficiency of merge sort?

a. O(log n). b. O(n). c. O(n log n). d. O(n2).

Computer Science & Information Technology

What different types of objects can be members of a distribution group?

What will be an ideal response?

Computer Science & Information Technology