Individuals who infiltrate the files of the Social Security Administration are examples of:

A) Hackers
B) Information thieves
C) Professional criminals
D) Software pirates
E) White-hat hackers

Ans: B) Information thieves

Computer Science & Information Technology

You might also like to view...

To import data from a Word table into an Access table, the data must be converted to a(n) ________

A) HTML file B) delimited file C) Excel table D) PDF file

Computer Science & Information Technology

A lookup field is another name for a Lookup data type

Indicate whether the statement is true or false

Computer Science & Information Technology