1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
2 years ago
10

Difference between hacking and cracking not hackers and crackers ​

Computers and Technology
1 answer:
Illusion [34]2 years ago
8 0
Answer The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors
You might be interested in
Trading stock or selling stock, selling real estate for profit, and selling other assets that gain value over time.
Andrei [34K]

Answer:

D is reasonable

Explanation:

3 0
2 years ago
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
3 years ago
I need help with this​
Elodia [21]
The answer is number 2.
8 0
3 years ago
What goes hand and hand with focus? A) company B) non-profit C) business D) organization
Katyanochek1 [597]

Answer:

I think the answer is D but please let me know if i am wrong

Explanation:

8 0
3 years ago
Read 2 more answers
Which of these statements correctly describes how to adjust an image on a
blondinia [14]
The answer is c because they are arrow indicating to size the picture.
5 0
3 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
    11·2 answers
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • Select the recommended design practice that applies to a web site using images for main site navigation.
    7·1 answer
  • Which of the following BEST describes an extranet?
    13·1 answer
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • Most project files will contain:
    9·1 answer
  • Additional metadata data is stored alongside the binary colour values for each pixel. Give two examples of metadata?
    9·1 answer
  • what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
    11·1 answer
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!