1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
9

_____ is the unauthorized entry into a computer system via any means

Computers and Technology
1 answer:
Montano1993 [528]3 years ago
4 0
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
You might be interested in
1.
Alecsey [184]
I think
The start and end shape
7 0
3 years ago
How to divert all calls & sms from other phone to my phone? is it possible?
gayaneshka [121]
<h2>Answer:</h2>

It is possible in case of calls. SMS cannot be diverted to other numbers.

<h2>Explanation:</h2>

Every mobile manufacturing company has its own settings features and every cellular network has its own codes yet the facility of call forwarding which is a phone feature that enables users to forward or redirect incoming calls to any alternate number, which may be either a land line or cellular number. This facility can be availed by going to the Setting menu, then call setting and looking for call forwarding option. Once you get to the call forwarding option, select the destination number where you can divert the calls received on your number. Unfortunately sms cannot be diverted.

4 0
4 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
Identify some advantages of using Excel over lists, paper files, or simple word documents?
ra1l [238]

Answer:

Explanation:

Difficult to manage advanced pricing rules. ...

Lack of control and security. ...

Excel is vulnerable to fraud/corruption. ...

Excel is susceptible to human error. ...

Excel is difficult to troubleshoot or test. ...

Excel is obstructive to regulatory compliance.

Whether it is family-based planning for a weekly, monthly or yearly calendar or a personal appointment daily planner or a schedule for managing bill payments, homework, favorite sports team's games, and many more, excel can make it easy to compile, filter, search, organize and simplify large amounts of data.

6 0
3 years ago
A(n ______ allows a user to specify a task without specifying how the task will be accomplished
Goshia [24]
The answer is: a query language


Hope that helped :)
6 0
3 years ago
Other questions:
  • Describe a function that would take in any RGB value and double its intensity. What do you think happens if the input is 200, 22
    8·1 answer
  • Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
    10·2 answers
  • If I make a Zoom Meeting, would you join it?
    7·2 answers
  • ______________________________Encompasses all of the information contained within a single business process or unit of work, and
    8·1 answer
  • PLEASE HELP ME ASAP ;(
    15·1 answer
  • Why is ssh preferred over telnet for remote connections?
    10·1 answer
  • What is the atomic number of neonWhat do the following results from the TEST FOR LIFE tab indicate about the sample
    15·1 answer
  • A stock transfer from a storage bin in one warehouse to a storage bin in another warehouse is a possible scenario under which wa
    5·1 answer
  • Where are my files shortcut in documents folder.
    14·1 answer
  • What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of deli
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!