Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.

A. bypass
B. theft
C. trespass
D. security


Answer: C

Computer Science & Information Technology

You might also like to view...

?When you drag a bulleted item in the Outline pane, a _____ indicates where the item will be placed.

A. ?horizontal line B. ?shaded box C. ?green dot D. ?magnifying glass

Computer Science & Information Technology

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.

A. information B. communications C. business D. proficiency

Computer Science & Information Technology

Which type of system's primary function is to store and manage a company's documents in a central library?

A. CMS B. DMS C. TPS D. MIS

Computer Science & Information Technology

On most computer systems characters read by the keyboard are stored in a temporary holding area called a ____ immediately after they are pressed.

A. register B. buffer C. stack D. RAM

Computer Science & Information Technology