____________ attempt to find weaknesses in software and work their way past these to achieve their goals.

a. Data spies
b. Crackers
c. Hardware thieves
d. Hackers

b. Crackers

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a prewritten formula that is used to solve mathematical problems

Fill in the blank(s) with correct word

Computer Science & Information Technology

If you type the criteria exactly as it displays in the criteria of the parameter query, the & symbol will concatenate the criteria with all of the following EXCEPT ________

A) the space B) the word "and" C) another space after "and" D) the word "Between"

Computer Science & Information Technology