Which of the following types of hackers hacks into systems to cause harm or steal data?

A) White hat
B) Gray hat
C) Green hat
D) Black hat

D) Black hat

Computer Science & Information Technology

You might also like to view...

Match the following operating systems with their characteristics:

I. Windows/Intel II. PC-DOS III. OS/390 and Z/OS IV. Linux V. iOS A. operating system developed for IBM B. GUI operating system C. a popular desktop computer platform D. cell phone operating system E. IBM mainframe operating system

Computer Science & Information Technology

Business documents can include all of the following EXCEPT ____.

A. resumes B. journals C. proposals D. newsletters

Computer Science & Information Technology