The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________.
A. Hackers
B. Worms
C. Bots
D. Online predators
E. Power users