____ refers to the act of breaking into a computer or network.

A. Spamming
B. Phishing
C. Hacking
D. Spoofing


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is the name of a Microsoft Excel file?

A) inventory.pdf B) inventory.accdb C) inventory.xlsx D) inventory.wpd

Computer Science & Information Technology

Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?

A. Category 6 cables B. Fiber-optic cables C. Coaxial cables D. All of the above

Computer Science & Information Technology

Compressed files sometimes are called ______ files.

A. packed B. abridged C. zipped D. concentrated

Computer Science & Information Technology

Describe the thinking skills that are commonly used in the troubleshooting process.

What will be an ideal response?

Computer Science & Information Technology