A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) __________.
A. penetration tester
B. expert hacker
C. phreaker
D. cracker
Answer: D
Computer Science & Information Technology
You might also like to view...
To select all slices in a pie, you double-click any slice
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following wireless networking standards operates at only 5GHz?
A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Computer Science & Information Technology