Script ____________________ are hackers of limited skill who use expertly written software to attack a system.

Fill in the blank(s) with the appropriate word(s).


kiddies

Computer Science & Information Technology

You might also like to view...

Here is a function prototype and a few lines of code. What is the correct call statement?

```void Function(int *p, int &r, string s); int a, b; string s; ``` A. Function(a, b, s); B. Function(&a, &b, s); C. Function(a, &b, s); D. Function(&a, b, s);

Computer Science & Information Technology

Match the following tabs in PowerPoint 2013 with an available feature on that tab:

I. Home II. File III. Design IV. View V. Insert A. New B. Decrease List Level C. Header & Footer D. Theme gallery E. Slide Sorter

Computer Science & Information Technology

An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) __________.

A. penetration tester B. expert hacker C. phreaker D. cracker

Computer Science & Information Technology

Which statement is not correct? A query language like SQL

A. is written in a fourth-generation language B. requires user familiarity with COBOL C. allows users to retrieve and modify data D. reduces reliance on programmers

Computer Science & Information Technology