An unauthorized change to a device's software is called a(n) _____.
A. cracking
B. hacking
C. rooting
D. jailbreak
Answer: D
Computer Science & Information Technology
You might also like to view...
Output from a monitor is considered ________ copy because it is not tangible
Fill in the blank(s) with correct word
Computer Science & Information Technology
__________ interconnections are the network devices, communications channels, and applications that may not be owned by the organization but are essential to the organization's cooperation with another company.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology