1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
Vocational schools are also called all of the following except:
Salsk061 [2.6K]
A vocational school can also be called all of the following except a certification school.
7 0
3 years ago
Read 2 more answers
To execute sas code, you can click on which icon?
faltersainse [42]

To execute SAS code, an icon which you can click on is: e. running man.

<h3>What is SAS?</h3>

SAS is an abbreviation for Statistical Analysis System and it can be defined as a statistical software suite which was developed at North Carolina State University by SAS Institute for the following field of study:

  • Business intelligence
  • Criminal investigation
  • Data management
  • Multivariate analysis
  • Advanced analytics
  • Predictive analytics

In Computer programming, running man is an icon which you can click on, in order to execute SAS code.

Read more on Statistical Analysis here: brainly.com/question/24439065

#SPJ1

7 0
2 years ago
The following SQL statement contains what type of subquery? SELECT b.title, b.retail, a.category, a.cataverage FROM books b, (SE
Sedbober [7]

Answer:

Inline view.

Explanation:

Inline view:-It is not a real view instead it is a sub-query or a SELECT statement in the FROM clause of the of another select statement.In the query provided we have a sub - query which is displaying category and Average of retail from the books table and this query is present in the FROM clause of other SELECT statement.

3 0
4 years ago
Critical observation thinking is best demonstrated by which of the following actions?
yarga [219]

Answer:

Spotting trend in data(apex)

Explanation:

5 0
3 years ago
Read 2 more answers
Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name o
yawa3891 [41]

Answer:

The program is as follows:

def get_price(fruits):

   AllPrice = fruits.values()

   value_iterator = iter(AllPrice)

   mostExpensive = next(value_iterator)  

   for item in fruits:

       if fruits[item]>=mostExpensive:

           mostExpensive = fruits[item]

           fruitName = item

   print(fruitName)

fruits = {}

n = int(input("Number of Fruits: "))

for i in range(n):

   name = input("Fruit name: ")

   price = int(input("Fruit price: "))

   fruits[name] = price

get_price(fruits)

Explanation:

This defines the get_price function

def get_price(fruits):

This gets all price in the dictionary fruit

   AllPrice = fruits.values()

This passes the values to a value iterator

   value_iterator = iter(AllPrice)

This initializes mostExpensive to the first price in the dictionary

   mostExpensive = next(value_iterator)

This iterates through the elements of the dictionary  

   for item in fruits:

If current element is greater than or equals most expensive

       if fruits[item]>=mostExpensive:

Set most expensive to the current element

           mostExpensive = fruits[item]

Get the corresponding fruit name

           fruitName = item

Print fruit name

   print(fruitName)

The main begins here

This initializes the fruit dictionary

fruits = {}

This gets input for the number of fruits

n = int(input("Number of Fruits: "))

This is repeated for every inputs

for i in range(n):

Get fruit name

   name = input("Fruit name: ")

Get fruit price

   price = int(input("Fruit price: "))

Append name and price to dictionary

   fruits[name] = price

Call the get_price function

get_price(fruits)

4 0
3 years ago
Other questions:
  • Who killed mrs.huffington
    14·1 answer
  • William has an internet connection that does not allow him to make calls when connected to the internet. what internet service c
    7·2 answers
  • Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
    11·1 answer
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • How do i recover a google account that was deleted?
    7·1 answer
  • What does a controller control?
    11·1 answer
  • Firewalls labeled as appliances are intended to be easy to use. <br> a. True <br> b. False
    10·1 answer
  • SLA:
    14·1 answer
  • Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value retu
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!