____________ attempt to find weaknesses in software and work their way past these to achieve their goals.
a. Data spies
b. Crackers
c. Hardware thieves
d. Hackers
b. Crackers
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a prewritten formula that is used to solve mathematical problems
Fill in the blank(s) with correct word
Computer Science & Information Technology
If you type the criteria exactly as it displays in the criteria of the parameter query, the & symbol will concatenate the criteria with all of the following EXCEPT ________
A) the space B) the word "and" C) another space after "and" D) the word "Between"
Computer Science & Information Technology