1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
Reason Do you multiply or divide if you want to change months to years? or Multiply or Divide​
PSYCHO15rus [73]

Answer:

Multiply

Explanation:

7 0
3 years ago
When prewriting for an informative essay, it is important to generate ideas that educate. conceal. entertain. persuade.
svet-max [94.6K]

When prewriting for an informative essay, it is important to generate ideas that is Educate.

Out of all these four options, the main objective of an essay is to educate about a particular topic or a subject.

Prewriting for an Informative Essay

  • Before directly writing an essay, it is very important to brainstorm first about the subject on which informative essay needs to be written.
  • While prewriting, it should be take care that ideas related to topic needs to be list down and all the ideas are generated with respect to educate the readers about the subject matter.
  • Idea mapping or listing down the points need to be collected while prewriting.

To learn more about prewriting, visit - brainly.com/question/1490948

#SPJ4

6 0
2 years ago
PLEASE HELP FOR 20 POINTS! The rock, dust, soil, and minerals of the Earth's solid crust and outer mantle make up the _______. A
EleoNora [17]

the answer is C. geosphere


4 0
3 years ago
Read 2 more answers
This explorer was looking for a way to go west from Europe to find Asia. He instead discovered a famous river and explored the a
Leona [35]

Answer:

Henry Hudson explored looked for a way to go west

8 0
3 years ago
One of the advantages of a home equity loan is that you can borrow money any time, up to the approved amount. true or false
tigry1 [53]

Answer:

True

Explanation:

4 0
3 years ago
Other questions:
  • "a child in which of piaget's stages of moral development does not take intentions into account when determining whether a behav
    5·1 answer
  • What are the latitude zones of russia
    13·1 answer
  • Explain the origins of African storytelling. What vital role(s) did it accomplish in African society?
    10·1 answer
  • According to the module, how many years after completion of your Bachelor's degree does it take to become a psychologist?
    13·1 answer
  • The former Soviet republic Turkmenistan in Central Asia is one of the last countries on the planet to gain Internet access. The
    8·1 answer
  • Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a
    7·1 answer
  • In the Water Kingdom Amusement Park, when two sea lions throw and catch balls on their nose, they are rewarded with fish after t
    15·1 answer
  • Describe life for most people living under feudalism-
    8·1 answer
  • Functions of peace keeping force ?
    14·1 answer
  • Why do football players wear tape on the back of their arms?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!