____ refers to the act of breaking into a computer or network.
A. Spamming
B. Phishing
C. Hacking
D. Spoofing
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is the name of a Microsoft Excel file?
A) inventory.pdf B) inventory.accdb C) inventory.xlsx D) inventory.wpd
Computer Science & Information Technology
Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?
A. Category 6 cables B. Fiber-optic cables C. Coaxial cables D. All of the above
Computer Science & Information Technology
Compressed files sometimes are called ______ files.
A. packed B. abridged C. zipped D. concentrated
Computer Science & Information Technology
Describe the thinking skills that are commonly used in the troubleshooting process.
What will be an ideal response?
Computer Science & Information Technology