?Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.
A. ?end users
B. ?cyberterrorists
C. ?cybercriminals
D. ?all of these
Answer: C
Computer Science & Information Technology
You might also like to view...
The AutoCorrect feature automatically pushes text to the next line when the insertion point meets the right margin. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The .xsd file is called the dataset's ____ file.
A. schema B. layout C. format D. standard
Computer Science & Information Technology
The process of moving a slide object to a new location using the mouse pointer is called _____.
A. drop and drag B. drag and drop C. drag and drip D. drip and drop
Computer Science & Information Technology
Trainers should aim the level of the training at ____ of the group of trainees.
A. the top level B. somewhat above the average level C. the lowest level D. somewhat below the average level
Computer Science & Information Technology