__________ occurs when an authorized person opens a door, and other people, who may or may not be authorized, also enter.

A. Crowdsurfing
B. Tailgating
C. Freeloading
D. Hitchhiking


Answer: B

Computer Science & Information Technology

You might also like to view...

Given: A file with the internal name payfile whose records contain each employee’s ID number and rate of hourly pay. Which of the following will assign the values of one record to the variables named IDNum and Pay?

a. Read IDNum, Pay, payfile b. Read From payfile Write IDNum, Pay c. Read payfile, IDNum, Pay d. Read payfile, IDNumber, payrate, IDNum, Pay

Computer Science & Information Technology

When text is written in ________ it can be perceived as shouting

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information?

A. embedded computers B. supercomputers C. mainframes D. mobile devices

Computer Science & Information Technology

The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology