1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
"passive learning" is where a learner simply ingests information without taking part in processing it.
vodka [1.7K]
The statement is "True".

Passive learning<span> is a technique for learning or direction where learners get data from the teacher and internalize it, and where the student gets no feedback from the educator. It is contrasted with active learning which includes the learning by being occupied with the instructional procedure by methods for such exercises as investigating, breaking down, conveying, creating, reflecting, or utilizing new data or encounters. </span>


3 0
3 years ago
Read 2 more answers
what is the process in which rocks are consistently destroyed and recreated A.the geographic cycle B.the rock cycle C.the minera
aev [14]

Answer:

the rock cyle

Explanation:

7 0
2 years ago
Identify the type I error. Group of answer choices Researchers conclude that drinking 2 beers slows reaction time, and this is t
navik [9.2K]

Answer:

In reality drinking 2 beers does not have much of an impact on reaction time, but researchers conclude from this experiment that drinking 2 beers significantly slows reaction time.

Explanation:

Hypothesis testing is used to test statistical significance of a mathematical proposition. Null Hypothesis is a neutral, no significance stating hypothesis. Alternate Hypothesis is a specific, significance stating hypothesis.

Null Hypothesis : Drinking 2 beers don't impact reaction time

Alternate Hypothesis : Drinking 2 beers impact (slows) reaction time

Type 1 Error is the rejection of an actually true null hypothesis. So, it implies that - In reality drinking 2 beers does not have much of an impact on reaction time, but researchers conclude from experiment that drinking 2 beers significantly slows reaction time.

8 0
3 years ago
Describe this sculpture, its location, and its purpose.
docker41 [41]

This sculpture was carved into the side of a mountain. It is a carving of Buddha and stand over 55 feet tall. The most likely purpose for this statue was to remind people of their god and the importance of remaining devoted to Buddha.
4 0
3 years ago
Read 2 more answers
Which of the following pharaohs was considered a regent?
lakkis [162]

Answer:

Queen Hatshepsut

Explanation:

The pharaoh was considered the divine intermediary between the gods and Egyptians. Hatshepsut was only the third woman to become pharaoh in 3,000 years of ancient Egyptian history. She was considered a regent.

Hope it helps!

3 0
3 years ago
Other questions:
  • How did technology change American life during the Victorian Era?
    5·2 answers
  • PLEASE HELP ME !!!!!!!<br> BRAINLIEST WILL BE GIVEN !<br> LIMITED TIME
    12·1 answer
  • As he watched Ed crow like a rooster at the hypnotist’s suggestion, George remarked, "Ed looks really relaxed. It looks like he
    6·1 answer
  • What role did Ivan I play in shaping Russian history?
    11·1 answer
  • Why did countries create their particular alliances during the Seven Years War​
    5·1 answer
  • This terrifying, and often deadly, voyage was called the _______________and lasted as long as three months.
    9·2 answers
  • Using different disciplinary techniques with girls and boys, interacting with boys more roughly than with girls, and selecting d
    10·1 answer
  • Who is Frosty’s favorite superhero?
    5·1 answer
  • What are the elements that affect the Fertility Rate? Mention.​
    8·1 answer
  • Which approach attempts to link measure of cognitive performance t measure of brain structure?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!