1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
True or False:
Brrunno [24]

Answer:

True.

Explanation:

8 0
3 years ago
List 3 specific rights or responsibilities listed in the Treaty of Paris.
Andre45 [30]

I'm sorry i don't know about this one

6 0
3 years ago
Read 2 more answers
Mercury, lead, nickel, and chromium are all examples of _____.
-Dominant- [34]
The answer the question is heavy metals because they are all metals i believe

3 0
3 years ago
Read 2 more answers
Which of the following is true about the real GDP?
Marta_Voda [28]

Answer:

a. I only

b. II only

c. III only

d. I and III

e. I, II and III

ANSWER:D - I & III only

Explanation:

3 0
3 years ago
¿Cuál era la importancia de la Escuela de Sagres en la Era de la exploración?
il63 [147K]

Plz translate, I’m not very flaunt in Spanish

5 0
3 years ago
Other questions:
  • What elements are found in all three stories? Check all that apply.
    9·2 answers
  • Very few societies base access to social rewards and resources on race or ethnicity. Please select the best answer from the choi
    13·2 answers
  • European nations colonized Africa to _____. A .prevent wars between African nations B. capture slaves for the Atlantic slave tra
    12·2 answers
  • Think back to the last few months. How did the pandemic and the shutdown lead to scarcity, and which products specifically can y
    11·1 answer
  • In 2009 there were only five African Americans who were CEOs of Fortune 500 companies, or 1 percent of the total number of Fortu
    8·1 answer
  • All else being equal, a study with higher statistical power will produce narrower 95% confidence limits for the cumulative incid
    5·1 answer
  • A W2 form is provided by a/an ___ to its employees to help them file
    10·2 answers
  • 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0
    6·1 answer
  • What is Eco!? <br><br><br>What is madness!? ​
    14·2 answers
  • Divided member loyalties, having personal confrontations, thinking individually, and learning team members roles are indicators
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!