?Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.

A. ?end users
B. ?cyberterrorists
C. ?cybercriminals
D. ?all of these


Answer: C

Computer Science & Information Technology

You might also like to view...

The AutoCorrect feature automatically pushes text to the next line when the insertion point meets the right margin. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The .xsd file is called the dataset's ____ file.

A. schema B. layout C. format D. standard

Computer Science & Information Technology

The process of moving a slide object to a new location using the mouse pointer is called _____.

A. drop and drag B. drag and drop C. drag and drip D. drip and drop

Computer Science & Information Technology

Trainers should aim the level of the training at ____ of the group of trainees.

A. the top level B. somewhat above the average level C. the lowest level D. somewhat below the average level

Computer Science & Information Technology