Can prove they are not infringing on copyright
Answer: as a whale attack
Explanation:
A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.
Based on the explanation above, the attack called into is a whale attack.
B.) is what most employers are looking for
The correct answer is A it transfers control to the next loop in the program.
The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.