Answer:
Explanation:
1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)
2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)
3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)
4. A software program specifically designed for computer forensic investigations - (EnCase)
5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)
6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)
7. Malicious software similar to a computer virus -- (_worm)
8. Federal legislation aimed specifically at computer crime (CFAA)
Answer:
A (information technology)
Explanation:
Ooh, ooh, ooh I know this one!
One advantage is that you don't have to make the entire layout of what you are doing from scratch. It is also time saving by not making you write everything.
Answer:c ll d
Explanation:
cus they are inside ()--parantheses
Answer:
The user cannot make internal changes, or personalize the computer. Also it would make it very easy for viruses to get into the computers and ccorrupt the entire thing. There is a similar example of this today in Modern Day chromebooks, but earlier computers were not as safe or secure. Also the fact that it can takes up massive amounts of data, requiring more server storage or data storage facilities.