1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
13

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
5 0

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

You might be interested in
Do i have to buy affinity photo on windows and mac
nikdorinn [45]
no you don’t have to buy that
6 0
3 years ago
Identify the following keys. write AK for Alphanumeric keypad,NK for Numeric Keypad,CK for Cursor Key, FK for Function keys and
natali 33 [55]

Answer:need points for stuff

Explanation:

4 0
3 years ago
Discuss how file and process ownership can pose a threat to the security of a computer system.
Irina-Kira [14]
It can gain access to potentially bad information about you. I hope you enjoyed
8 0
3 years ago
Which of the following is a shortcut command for pasting text?
Burka [1]
Command and the letter V
5 0
4 years ago
Read 2 more answers
A ________ is a computer or other electronic device connected to a network
ANTONII [103]
<span>urse unless you have permission to Save and Exit. Once you Save and Exit, a</span>
3 0
3 years ago
Other questions:
  • What is the utility of a lever?
    11·2 answers
  • Hey can you help we with this thanks
    5·1 answer
  • Olivia started working last year. By April 15th, she will need to prepare and send the Federal government _____.
    15·2 answers
  • You and your project team have been asked to generate a solution to a problem. The problem is not complicated, and you are sure
    6·1 answer
  • You are seeking a way to store computer files so you have backup copies anywhere you go.? Which one of the secondary storage typ
    11·1 answer
  • Why is it best to run av scans when the computer isn���t being utilized?
    7·2 answers
  • Find the domain and range of Y=x^3-9/x-3​
    14·1 answer
  • Which retouching action is unethical?
    8·1 answer
  • How does a python programmer concatenate a numeric value to a string value?
    7·1 answer
  • Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!