________ are individuals who use their extraordinary computing skills for illegal or malicious purposes.

A. Black Hats
B. Gray Hats
C. Hacktivists
D. White Hats


Answer: A. Black Hats

Computer Science & Information Technology

You might also like to view...

Associations in a class diagram that have no navigability arrows at all indicate:

a. That the two classes are the same. b. Inheritance from the same base class. c. That navigation can proceed in either direction across the association. d. That operations performed by this association do not return values.

Computer Science & Information Technology

Physical data flow diagrams:

A) include processes for adding, updating, changing and deleting records. B) are used to model business events, along with their input and output. C) enable the analyst to better understand the business. D) include no interface data flow in or out of processes.

Computer Science & Information Technology

________ view allows you to change the layout of the form by moving the controls and resizing or adding controls

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is Dumpster diving?

A. An attack in which an attacker goes through the files kept in a recycle bin folder on a computer system. B. An attack in which an attacker uses a software to search memory garbage data. C. An attack in which an attacker goes through a firm’s trash bins looking for documents, backup tapes, floppy disks, and other information-carrying media. D. It's a diving sport.

Computer Science & Information Technology