Answer:
By acting or posing as a waste management collector looking to fix the dumpster or collect the debris
Step-by-step explanation:
The computer as an electronic machine has served as a tool or an object of the crime, subject of the crime and an instrument of the crime
Cyber crime
This is simply known as a criminal act. It is the process by which there is the stealing or destruction of information, resources, or funds utilizing computers, computer networks and the Internet.
Computer fraud
This is simply a type of fraud committed with the use of contemporary technology and it is regarded as a law crime. It includes theft of information and corporate espionage etc.
Most cyber crimes are usually well organized. The individual committing the crime usually puts a lot of efforts in achieving their goal. Toby could only have gained access to the company dumpster if he poses as the one or company sent to collect the trash.