A _______ is a person who uses one computer to break into another.
A. hacker
B. electronic thief
C. pirate
D. spammer
Answer: A
You might also like to view...
______ specifically refers to the weighing of anticipated benefits of a given course of action against its possible costs.
a. human agency b. hedonistic calculus c. rationality d. positivism
Con man 1 finds a wallet, purse, attaché case, or even a paper bag apparently filled with money. An unsuspecting victim standing nearby witnesses the discovery. At that time, con man 2 appears and claims that he is entitled to a share of the loot just as much as the other. It should occur to the victim at this point that he or she should share in the proceeds
What crime is being committed? A) The pyramid scheme B) The bank examiner scheme C) The travel scam D) The pigeon drop
The National Academy of Science's report has shown
a. the death penalty has a strong deterrence effect on crime b. the death penalty has moral and constitutional properties c. there is no conclusive evidence on the deterrent effect of the death penalty d. the death penalty affects the murder rate
Combustible hazards are an issue in any type of fire. Which of the following IS NOT one of the groups of combustible hazards, as identified in the textbook?
a. Toxic gasses b. Heat c. Smoke d. Flames