Due to a malfunction in the online security system, the database was left open and ......... to attack. palpable negotiable vulnerable operable
The customers' information was hijacked and ......... to a rival company. on sold undersold oversold sold
After the company's data records mysteriously went missing overnight, new password protection programs were .......... implemented illustrated instilled instigated
The computer hacker paid his fellow worker ......... money not to speak to anyone about his criminal activities. hush calm silent quiet
By day, the accountant went about his work in a professional manner. No one suspected that at night, he was ......... the books. logging cooking drawing overturning
According to ......... theory, the longer a password is, the more difficult it is to guess. Unfortunately this also makes it more difficult to remember! compatible constructive convenient contemporary
Patents do not protect a product from being duplicated. Many countries simply do not ......... patent laws. recognise regale neglect discover
The PR company hoped that by ......... potential employees to personality profiling tests, they would discover if any candidates were untrustworthy. instructing submitting demanding attending
......... wisdom holds that one should upload new files only if they have been checked with virus-detection software. Concise Convivial Conventional Correctional
The man's employment ......... were not good. He had a criminal record for credit card fraud. prospects negotiations applications negations