puppydog8514 puppydog8514 09-06-2018 Computers and Technology contestada A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerabilities in hardware or software