A _________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
A) superuser
B) misfeasor
C) masquerader
D) clandestine user
B) misfeasor
Computer Science & Information Technology
You might also like to view...
When a report is exported to Word, it is saved as a(n) ________ file
A) Rich Text Format B) Document C) Text D) PDF
Computer Science & Information Technology
Visual Basic provides the ____ method for accessing any number of characters contained in a string.
A. Portion B. PartialString C. Substring D. PieceString
Computer Science & Information Technology