8. A network is a group of people or devices connected for the sole purpose of __________ and __________ resources. 9. Allison’s computer has a common Trojan horse known as a keystroke logger. What consequence will she experience? 10. Jenny is using a social media site that allows her to set up a profile and post messages of up to 280 characters in length. What social media site she is most likely using?