Answer the following statement(s) true (T) or false (F)
1. Computers can be used to facilitate various types of crime.
2. Online pedophiles target older hackers and participants in chat rooms.
3. The term hacker was coined in 1990.
4. Steganography is not considered an attack on a computer system.
5. A dictionary attack consists of guessing numerous common passwords in order to log on to a computer system.
1. True
2. False
3. False
4. False
5. True
You might also like to view...
The ________ patrol technique consists of a high degree of patrol within a given area, including traffic stops and field interviews designed to reduce street crime
A) saturation B) aggressive C) directed D) foot
Which of the following is NOT an essential knowledge needed when heading out to patrol?
A) favorite foot patrol pattern of your partner B) new housing tracts, buildings, and streets C) general and special orders D) area of responsibility E) changes in jurisdictional boundaries
Discuss why legislatures have become the principal source of law beginning in the early 20th century to the present
What will be an ideal response?
The Spanish presence in North America ____________ the Anglo presence on much of the continent
Fill in the blank(s) with correct word