1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
Gala2k [10]

A,B,C AND D.  All depend on end user uses.

A. sites that connect you to more information on your topic

B. databases that link your topic to available sources

C. indexes on connective materials

D. shortcuts to help you narrow the search field

<u>Explanation:</u>

Boolean connectors are nothing but Boolean operators such as AND, OR, NOT, XOR,IMP, ISNOT , “=”, “>=”, “<>”,”<=” extra.

It all depends up how the end user uses in the programming languages. Normally if Boolean connector returns true value, instruction or set of instruction are used to execute for next core of action in the programming language.

Mostly in any programming language relation operators such as “=”, “>=”,”<=”,” <>” extra with his combination add on logical operators are used such as “And”, “OR” and “NOT” extra.

3 0
3 years ago
Types of motherboard​
Arada [10]

Answer:

Types of Motherboard

Explanation:

Motherboards are present in Desktop, Laptop, Tablet, and Smartphone and the components and functionalities are the same. But the size of the components and the way they are accommodated on the board varies due to space availability. In desktops, most of the components are fitted inside the sockets provided on the board and it is easy to replace each of them separately, whereas in Laptops/Smartphones some components are soldered on the board, hence it is difficult to replace/upgrade.

Though different motherboards have varying capabilities, limitations, features, Physical size/shapes (form factor), they are identified/grouped/categorized mostly by their form factors. Each manufacturer has come out with its form factor to suit the design of computers. Motherboard manufactured to suit IBM and its compatible computers fit into other case sizes as well. Motherboards built using ATX form factors were used in most of the computers manufactured in 2005 including IBM and Apple.

6 0
3 years ago
Where does the list of incoming mail appear in gmail
k0ka [10]
In your inbox,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,..,.,
5 0
4 years ago
Read 2 more answers
Write a program that asks the user to enter the amount s/he has budgeted for a month. The amount should be between 1000 and 2000
Elena-2011 [213]

Answer:

The program to this question can be given as:

Program:

  //import package for user input.

import java.util.*;      

//define class

public class Budget                      

{

public static void main(String [] a)            //define main method.

{

//creating Scanner class object.

Scanner ob =new Scanner(System.in);    

//define variable.      

double budgetamount=0, amountspent=0 ,difference=0,total=0,num=0 ;        

int count = 0;                            

System.out.println("How much have you budgeted for the month? :");        //print message.

budgetamount=ob.nextDouble();                             //taking input

       while(budgetamount != 0)           //checkig number greater then 4 digite.

       {

           budgetamount= budgetamount/10;        

           ++count;

       }

       if(count>4)                 //condition

       {

       System.out.println("enter each expense, then type -999 to quit: ");

       while(num!=-999)               //taking expense  

       {

       total=total+num;                 //totaling expense

       num=scan.nextDouble();                  

       }

       if(total<=budgetamount)           //condtion for over budget.

       {

       System.out.print("under budget:");         //print message

       System.out.print(budgetamount-total);

       }

       else

       {

       System.out.print("over budget:");              //for under budget

       System.out.print(total-budgetamount);

       }

       }

       else

       {

       System.out.println("not valid");        //message for number lessthen 4 digit.    

       }                                      

}

}

output:

How much have you budgeted for the month? : 1200.55.

enter each expense, then type -999 to quit: 365.89

556.90

339.98

-999

over budget:1262.77

Explanation:

The explanation of this program can be given as:

In the above program we import the package in that is used for scanner class. This class is used for the input from the user after input we use the while loop and if-else statement. The while loop is the entry control loop It is used for input validation and if-else is used for the checking condition. Then we insert expense that is inserted by the user. Then we calculate under-budgeted and over-budgeted by conditional statement that is if-else. and at the last we print it.

5 0
3 years ago
Characteristics and features of a tablet. List some screen gestures
oksian1 [2.3K]

A tablet is a thin, lighter-weight mobile computer that has a touch screen. A popular style of tablet is the slate, which does not contain a physical keyboard. Like laptops, tablets run on batteries or a power supply or both; however, batteries in a tablet typically last longer than those in laptops. Touch screen gestures include: tap, double-tap, press and hold, drag or slide, swipe, stretch, and pinch.

- Mabel <3

3 0
4 years ago
Other questions:
  • A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each
    14·1 answer
  • Formatting can be applied to
    10·2 answers
  • Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
    11·1 answer
  • A cable that connects the computer to the printer is an example of<br> A.hardware<br> B.software
    13·2 answers
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • PLS HELP For this activity, you can use the audio recorder on your cell phone or a digital camera to record the following sounds
    14·1 answer
  • A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger
    9·1 answer
  • Define a function allEqual of type ''a list -&gt; bool that will return true will all element in the input list are all equal, f
    14·1 answer
  • Help please i will give Brainliest
    7·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!