Hi,
The word you are looking for is "Hacking".
"Hacking is unauthorized entry into a computer system via any means."
Hope this helps.
r3t40
1. Requirements gathering/analysis.
2. Design.
3. Development.
4. Testing.
5. Maintenance.
To accept all the changes in a document click Accept All.
Solution :
It is given that Lael always looks out for the students who are interested in running for the office in a student group.
We use an excel sheet to determine whether a student had already elected to the office of the student group or not.
The formula used for the excel sheet used is :

K L M N
Elected group Finance certificate
Yes Yes Yes
No Yes Yes
No No No