Tom believes that a customer of his Internet service provider has been exploiting a vulnerability in his system to read the email messages of other customers. If true, what law did the customer most likely violate?

A. ECPA
B. CALEA
C. HITECH
D. Privacy Act

Answer: A. ECPA

Computer Science & Information Technology

You might also like to view...

________ functions are used to find values stored in lookup tables

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements creates a multidimensional array with 3 rows, where the first row contains 1 element, the second row contains 4 elements and the final row contains 2 elements?

a. int[][] items = {{1, null, null, null}, {2, 3, 4, 5}, {6, 7, null, null}}; b. int[][] items = {{1}, {2, 3, 4, 5}, {6, 7}}; c. int[][] items = {{1}, {2, 3, 4, 5}, {6, 7}, {}); d. int[][] items = {{1}, {4}, {2}};

Computer Science & Information Technology