Use of a computer for unauthorized access to information about a customer, patient, or student is called ____.

A. waste of resources
B. an ergonomic problem
C. piracy
D. invasion of privacy


Answer: D

Computer Science & Information Technology

You might also like to view...

How many activities exist within the BSIMM?

A. 56 B. 78 C. 111 D. 156

Computer Science & Information Technology

What tab should a CentOS 7 administrator use in System Monitor to view the usage history of their system's swap memory?

A. Resources tab B. Processes tab C. Memory tab D. File System tab

Computer Science & Information Technology

In database terminology, a link between two tables is called a(n) ____.

A. active join B. relationship C. import D. export

Computer Science & Information Technology

While the concept of privacy has been debated by the courts and legal systems for nearly two centuries, the strongest definition of the concept came about when The Privacy Act was passed. This happened in the year _______.

a. 1916 b. 1974 c. 1986 d. 1888

Computer Science & Information Technology