A person who tries to break into a computer is referred to as a(n) ________
Fill in the blank(s) with correct word
hacker
Computer Science & Information Technology
You might also like to view...
The change history information includes the name of the person who made each change, when the change was made, and:
A) what folder was opened. B) what data was changed. C) what file was opened. D) what computer was used.
Computer Science & Information Technology
Merging cells in a row at the top of the table is often done to create a(n) ____.
A. table heading B. information row C. title row D. caption row
Computer Science & Information Technology