An unauthorized change to a device's software is called a(n) _____.

A. cracking
B. hacking
C. rooting
D. jailbreak

Answer: D

Computer Science & Information Technology

You might also like to view...

Output from a monitor is considered ________ copy because it is not tangible

Fill in the blank(s) with correct word

Computer Science & Information Technology

__________ interconnections are the network devices, communications channels, and applications that may not be owned by the organization but are essential to the organization's cooperation with another company.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology