1. All have the same motive
2. Are people who maintain computers
3. May legally break into computers as long as they do not do any damage
4. Are people who are allergic to computers
5. Break into other people’s computers
Break into other people’s computers
1. Program delivery
2. Data snatching
3. Software privacy
4. Program looting
5. Data looting
Software privacy
1. Spam
2. Spoof
3. Cookie crumb
4. Sniffer script
5. Spill
Spam
1. Monitors
2. Overhead projection
3. Monitors and overhead projections
4. Touch screen kiosks
5. Loud speakers
Monitors and overhead projections
1. A mouse
2. A Printer
3. A sound format
4. A scanner
5. A mobile phone
A sound format
1. PC’s
2. Minicomputers
3. Mainframe computers
4. WANs
5. Super computers
PC’s
1. Speaker
2. Microphone
3. Talker
4. Mouse
5. Telephone
Microphone
1. Approximately one year
2. Approximately two years
3. Approximately five years
4. Approximately twenty-five years
5. Almost unlimited
Approximately five years
1. Default
2. CPU
3. Peripheral
4. User-friendly
5. Defaulter
Default
1. User name and street address
2. Legal name and phone number
3. User name and domain name
4. Initials and password
5. User name and recipient name
User name and domain name