1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
If you reformat your computer does it get rid of viruses
Anuta_ua [19.1K]
Yes but it will also get rid of any unbacked up files and programs. you will be starting over from scratch.
4 0
2 years ago
Rahul has job offers from three different employers. He carefully analyzes the advantages and disadvantages of each of the offer
Alecsey [184]

Answer:

Heuristic thinking

Explanation:

This form of thinking involves educated and calculated guess, it involves critical thinking that leads to a major decision. It can be understood that Raul is trying to figure out the right man for the job, convergent thinking is used majorly in questions and answers, trying to pick this right answer from the question, same goes to divergent as that is the opposite of convergent. The best thinking that explains what Raul is trying to figure out is heuristic thinking.

3 0
3 years ago
________ is the tendency to rely too heavily on one trait or piece of information when making decisions. Group of answer choices
tangare [24]

Answer:

Anchoring

Explanation:

The anchor may be explained as the first piece of information which an individual has access to. This anchor, or information, hence affects the decision made by the individual as they rely so heavily on it no matter the level or degree of veracity of the information. The anchor may be seen as a particular reference point over which a the person uses as a benchmark for his belief on certain issues. For instance, a person might had an initial information on a particular subject. This information might be adopted by the person as an anchor such that he relies so heavily on it no matter how false it may seem.

5 0
3 years ago
On the freeway, maintain a 3 second following distance. If the road is slippery or wet, adjust your distance to _________.
Pachacha [2.7K]

Answer:

On the freeway, maintain a 3 second following distance. If the road is slippery or wet, adjust your distance to four or more seconds.

Explanation:

Every time climate conditions change, your vehicle will have variations in the way it reacts. So, if in regular conditions you should maintain a 3-second following distance, in other unusual conditions you must adjust this setting to be more cautious, and prevent any unforeseen events that could lead to an accident.

7 0
3 years ago
Standard search engine spiders are typically unable to index _____. select all that apply.
elena55 [62]

Standard search engine spiders are typically unable to index <u>databases of unlinked content. sites that require user login</u>.

Search engines usually refer to links to paid listings as "paid". A banner ad is an ad that appears in a box on a page (usually at the top of the page, but sometimes on the side or bottom of the page).

The title tag should contain important keywords. This allows search engines to determine what the page is about and index those keywords. The best way to ensure that pages can be found with specific keywords is to list them as keywords in your meta tags.\

A search engine is a software system for performing web searches. They systematically search the World Wide Web for specific information specified in a textual web search query. Search results are usually displayed in a result row called a search engine results page.

Learn more about search engines here brainly.com/question/512733

#SPJ4

4 0
1 year ago
Other questions:
  • What do you think is the most compelling scientific reason NOT to build offshore wind farms?
    6·1 answer
  • Discuss the backgrounds of the writers of the constitution, and explain why these men tended to be rather mistrustful of the not
    7·1 answer
  • Psychologists define learning as the process of
    8·1 answer
  • The GATT Uruguay Round negotiations led to groundbreaking changes in the following areas, with the exception of
    6·1 answer
  • Look at each set of four terms. On the line provided, choose the letter of the term that does NOT relate to the others.
    12·1 answer
  • Victor is trying to convince his parents to buy him a car and quotes the statistic that teenagers are 30% less likely to get int
    14·1 answer
  • The Lemps have been looking at new homes for weeks and have not found anything worthy of an offer. Mikel, their agent, has inves
    9·1 answer
  • What happens to electrical energy that is used by objects in our homes?
    9·2 answers
  • In 1900, roughly 85 percent of Georgia's population lived in rural areas. By the 2000s, that number had dropped to about 25 perc
    15·1 answer
  • What is the role of Georgia's state agencies?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!