1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
sweet [91]

Answer:

#include<stdio.h>

#define DOLLAR 100

#define QUARTER 25

#define DIME 10

#define NICKEL 5

#define PENNY 1

void calculatedChange(int userAmount,int coinValues[])

{

if (userAmount >=100)

{

coinValues[0]=userAmount/DOLLAR;

userAmount=userAmount-(100*coinValues[0]);

}

if (userAmount >=25)

{

coinValues[1]=userAmount/QUARTER;

userAmount=userAmount-(25*coinValues[1] );  

}

if (userAmount >=10)

{

coinValues[2]=userAmount/DIME;

userAmount=userAmount-(10*coinValues[2]);

}

if (userAmount >=5)

{  

coinValues[3]=userAmount/NICKEL;

userAmount=userAmount-(5*coinValues[3]);

}

if (userAmount >=1)

{

coinValues[4]=userAmount/PENNY;

userAmount=userAmount-coinValues[4];

}

}

int main() {

int amount;

printf("Enter the amount in cents :");

scanf("%d",&amount);

if(amount<1)

{

printf("No change..!");

}

else

{

int coinValues[5]={0,0,0,0,0};

calculatedChange(amount,coinValues);

if (coinValues[0]>0)

{

printf("%d Dollar",coinValues[0]);

if(coinValues[0]>1) printf("s");

}

if (coinValues[1]>0)

{

printf(" %d Quarter",coinValues[1]);

if(coinValues[1]>1) printf("s");

}

if (coinValues[2]>0)

{

printf(" %d Dime",coinValues[2]);

if(coinValues[2]>1) printf("s");

}

if (coinValues[3]>0)

{

printf(" %d Nickel",coinValues[3]);

if(coinValues[3]>1) printf("s");

}

if (coinValues[4]>0)

{

printf(" %d Penn",coinValues[4]);

if(coinValues[4]>1) printf("ies");

else printf("y");

}

}

}

Explanation:

  • Create a calculatedChange method for calculating userAmount.  
  • Use conditional statements to check dollars , quarters , dimes , nickels  and penny.
  • Inside the main method , validate the input  and then  print dollars , dimes , nickels after checking them.

7 0
3 years ago
A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
Gekata [30.6K]
Variable

----------------------------------
6 0
4 years ago
A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
andrew11 [14]

Answer:

1066.67 N

Explanation:

Given that two measurements of the arm and an input weight. To answer this problem,we need to balance the forces and use the lengths of the arms. 

Force × effort of arm distance= input weight × load distance

200 N * 8 m = x * 1.5 m

1600 = 1.5x

x = 1600/1.5

x = 1066.666 N

it takes 1066.67 N to lift the input weight

4 0
3 years ago
Giving brainliest to the Person finishes this song lyric.
muminat

Answer:

the man on the silver mountain

Explanation:

because it can

5 0
2 years ago
Read 2 more answers
Which of the following is a property of TCP?
Serggg [28]

Answer:

o best effort

Explanation:

beacuse it i think do

3 0
3 years ago
Other questions:
  • What should a career plan include?
    7·1 answer
  • Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeopl
    6·1 answer
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • In this context, the word “session” refers to _____.
    5·2 answers
  • Warm colors including red, yellow and orange _____________ be energetic and exciting to the eye, while cool colors in blue, gree
    11·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • What is the role of the memory in a computer ​
    11·1 answer
  • What is lossless compression
    6·2 answers
  • How would you describe binary to someone ??<br> PLEASE ANSWER I WILL GIVE U BRAINLY!!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!