Question: a. What is the definition of hacking? 9a1.) Hacking is defined as using a computer resource without authorization or in excess of authorization. a. True

a. What is the definition of hacking?

9a1.) Hacking is defined as using a computer resource without authorization or in excess of authorization.

a. True

b. False


9a2.) Which of the following meets the definition of hacking?

a. To intentionally use a computer resource without authorization

b. To intentionally use a computer on which you have an account but use it for unauthorized purposes

c. Both A and B

d. Neither A nor B


b. If you see a username and password on a sticky note on a monitor, is it hacking if you use this information to log in? Explain in terms of the definition. (Answer: Yes it is; you did not receive authorization to use it.)

9b.) If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?

a. Yes

b. No

c. It cannot be determined from the information given.


c. You discover that you can get into other e-mail accounts after you have logged in under your account. You spend just a few minutes looking at another user’s mail. Is that hacking? Explain in terms of the definition.

9c.) You accidentally discover that you can get into other e-mail accounts after you have logged in under your account. You spend just a few minutes looking at another user's mail. Is that hacking?

a. Yes

b. No

c. It cannot be determined from the information given.


d. If you click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see, is that hacking? Explain in terms of the definition.

9d1.) You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?

a. Yes

b. No

c. It cannot be determined from the information given.


9d2.) You are concerned with the security of a site you use. You run a vulnerability test against it. The responses reveal a security threat. Is this hacking?

a. Yes

b. No

c. It cannot be determined from the information given.

Step by Step Solution

3.50 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Hacking is intentionally using a computer resource without authorization or in excess of auth... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!