encr ption algorithm inserts characters between existing A(n) d. substitution A techniqe that intruders use to make their network transmission appear legitimate t 4 e. Back door entry d. Cyberwarfare computer a. Spoofing b. Encrypting professionals c. Public-domain software d. A software suite 45s a ty of application that assists professionals and designers in creating engineerin architectural, and scientific designs and models a Enterprise software b. CAD software TRUE/FALSE Statements Place T or Fon the blank line If computer equipment is networked, a single power disturbance can damage multiple system 2Spam is a program placed on a computer without the user's knowledge that secretly collects in formation about the user 3An uninstaller is a tool that removes programs as well as any associated entries in Copyright law gives the public fair use to copyrighted material 5 If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem. 6Wordwrap forces you to stop ty ping words and press the ENTER key at the end of each line. 7 The mouse pointer becomes different shapes depending on the pointer's location and locations you click 8 Information accuracy and privacy is not a concern for computer users 9 In the MLA style, notes are used only for optional explanatory content or bibliographic notes 0 To place your name to the left of the page number, as shown in the accompanying figure and as required on the screen by the MLA style, you must create a header that contains the page number 11 According to the MLA style, the first line of each entry on the works cited page begins at the left margin. The MLA style requires that the works cited be listed in alphabetical order by the author's last name or, if the work has no author, by the work's title. 13. The conclusion, which follows the introduction, consists of several paragraphs that support the not warn or block from potential fraudulent suspicious websites. ter othics are moral guidelines that govern the use of computers, mobile devices and Information topic. system