1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
1.Input device which transfers information and images from physical documents to computer files.
valkas [14]

Answer:

Scanner.

Explanation:

Scanner refers to an input device which transfers information and images from physical documents to computer files. It is simply an electronic device that is used to digitally scan or copy data (informations) from a hardcopy document such as photographs, paper files, printed texts etc and then converted to a digital computer file in formats such as png, or jpeg. The scanner is a device which avail users the ability and opportunity to view, edit and transfer hardcopy document on a computer system in soft-copy.

Majority of the scanners used around the world are flatbed scanners and as such have a flat glass surface for scanning documents. Basically, all scanners are to be used with a device driver software pre-installed on the computer before the configuration of the scanner.

<em>Other types of scanners are drum scanners, contact image sensor (CIS) scanner, CCD scanner, planetary scanner, 3D scanner, Roller scanner etc</em>.

5 0
3 years ago
Write a complete program that declares an integer variable
Fed [463]

Answer:

Java:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   Scanner sc = new Scanner(System.in);

   int number = sc.nextInt();

   System.out.println(number + " " + number*2 + " " + number**2);

 }

}

Python:

num = int(input("Number: "))

print(num+" "+num*2+" "+num**2)

C++:

#include <iostream>

int main() {

 int number;

 std::cin >> number;

 std::cout << num << " " << num*2 << " " << num**2;

 return 0;

}

3 0
2 years ago
The name of a person their address and their contact information like phone number and email address or consider the minimum inf
kozerog [31]

The name of a person their address and their contact information like phone number and email address or consider the minimum information or a desktop publishing should include on a letterhead or personal use is true.

True

<u>Explanation:</u>

Since it is used as personal letterhead, end user should have contact details as minimum, which should carry name, phone number and email address.

Letter head should have more space for end user to type or draft the text. If letter head occupies more space end user has limited to space for typing text or draft a letter.

Mostly letter head should simple which should carry less space for letter head. On letter head normally use one color or simple color and it should more attractive.

5 0
3 years ago
Write a code that takes numbers from the user as a list. (User can enter as many numbers as he wants). Then, find mean and stand
8090 [49]

nums = list(map(int, input().split()))

mean = sum(nums)/len(nums)

print("The mean is",mean)

values = 0

for x in nums:

   values += abs(x - mean)**2

print("The standard deviation is",(values / (len(nums)-1))**0.5)

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
To move from layout view to form view, tap or click the _____ button on the access status bar.
bija089 [108]
To move from layout view to form view, tap or click the _____ button on the access status bar.
View button
8 0
3 years ago
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • Ideally an entity identifier is composed of _____ attribute(s).
    11·1 answer
  • If you were to mount a nonmetallic box to the front of a stud, what type of bracket should the box have? A. FP B. BP C. NP D. JP
    13·1 answer
  • Run the browser checker to see that the computer you are using now is set up for WileyPLUS. Which of the following browser funct
    15·1 answer
  • During detachment, _____.
    12·2 answers
  • Ad identifies and describes at least four ways to prevent downloading of spyware, adware, and viruses to computer
    9·1 answer
  • Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for th
    13·1 answer
  • Whats 12/29 divided by 12/34
    7·2 answers
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!