Which of the following types of hackers hacks into systems to cause harm or steal data?
A) White hat
B) Gray hat
C) Green hat
D) Black hat
D) Black hat
Computer Science & Information Technology
You might also like to view...
Match the following operating systems with their characteristics:
I. Windows/Intel II. PC-DOS III. OS/390 and Z/OS IV. Linux V. iOS A. operating system developed for IBM B. GUI operating system C. a popular desktop computer platform D. cell phone operating system E. IBM mainframe operating system
Computer Science & Information Technology
Business documents can include all of the following EXCEPT ____.
A. resumes B. journals C. proposals D. newsletters
Computer Science & Information Technology