Answer:
when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”. so they are doing something that they are not suppose to do and or the do something that someone else was not ok with and or they didnt ask to do it.
Step-by-step explanation: