Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.
A. bypass
B. theft
C. trespass
D. security
Answer: C
Computer Science & Information Technology
You might also like to view...
?When you drag a bulleted item in the Outline pane, a _____ indicates where the item will be placed.
A. ?horizontal line B. ?shaded box C. ?green dot D. ?magnifying glass
Computer Science & Information Technology
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.
A. information B. communications C. business D. proficiency
Computer Science & Information Technology
Which type of system's primary function is to store and manage a company's documents in a central library?
A. CMS B. DMS C. TPS D. MIS
Computer Science & Information Technology
On most computer systems characters read by the keyboard are stored in a temporary holding area called a ____ immediately after they are pressed.
A. register B. buffer C. stack D. RAM
Computer Science & Information Technology