1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
9

_____ is the unauthorized entry into a computer system via any means

Computers and Technology
1 answer:
Montano1993 [528]3 years ago
4 0
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
You might be interested in
P1 has a clock rate of 4 GHz, average CPI of 0.9, and requires the execution of 5.0E9 instructions.P2 has a clock rate of 3 GHz,
nadezda [96]

Answer:

Following is attached the solution for all parts. I hope it will help you!

Explanation:

7 0
3 years ago
How to get answers on Microsoft form any code or hacks u can guv that'll be nice
KonstantinChe [14]

Simple, really. No hacks required. Just study and you'll do fine.

3 0
3 years ago
The html global attribute, "contenteditable" is used to:
satela [25.4K]
<span>The html global attribute, "contenteditable" is used to:</span>Specifies whether the content of an element is editable or not
3 0
3 years ago
The class attribute
Elodia [21]

the answer is d plz let me know if i got it right

6 0
3 years ago
You turn your computer on and the computer will not boot up where is something you should do to diagnose the problem?
Svetllana [295]
Is this an educational question
4 0
3 years ago
Other questions:
  • .How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
    13·1 answer
  • What is point mode in excel 2013?
    15·1 answer
  • What is responsible for what u see on a computer monitor?
    11·1 answer
  • Which is better analog music or digital music
    15·2 answers
  • Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
    15·1 answer
  • What area on the Microsoft® Publisher® application screen shows the name of the publication?
    9·1 answer
  • The decryption broker feature is supported by which three Palo Alto networks firewall series
    13·1 answer
  • Explain what 10CLS program does and the write the output​
    13·1 answer
  • A keyboard would be considered _____. Select 2 options.
    13·2 answers
  • 90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!