1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
Before another individual's death, some people go through a period of
ycow [4]
Depression would be the correct word.
If someone’s knows there going to die, they would go through a depressing stage.
3 0
3 years ago
Central Asia is bordered by __________ in the north and __________ in the east.
andriy [413]
The answer is Russia . . . China
3 0
2 years ago
How have women in Congress impacted the US government?
wel

Answer:Correct Answers:

by adding Title IX to the Civil Rights Act of 1964

by serving on the first Ways and Means Committee

by contributing to the New Deal policies

Explanation:

8 0
3 years ago
Read 2 more answers
Why is untouchability wrong?​
leva [86]

Answer:

because it hamper the social justice ...

3 0
3 years ago
Read 2 more answers
God judged Israel's last recorded sin of ____ with death by serpents.
leonid [27]
The answer is: Murmuring ;)<span />
5 0
3 years ago
Other questions:
  • How are city parks thought to make urban areas more livable?
    11·1 answer
  • Give two reasons for the appeal and importance of nonfiction in today's world.
    9·2 answers
  • England won respect from others countries because the Spanish Armada was defeated.Answer True  False
    15·2 answers
  • Carissa's parents let her stay up as late as she wants. she is allowed to pick out her own clothes and decide when and what she
    14·1 answer
  • K has an accidental death and dismemberment (ad&amp;d) insurance policy where her husband is beneficiary and her daughter is con
    14·1 answer
  • The Age of Enlightenment introduced a new focus on
    12·1 answer
  • An isotope of this element is used to date objects found in archeological sites. What is the element?
    7·2 answers
  • Which statement best describes Rome’s climate?
    6·2 answers
  • During the New Deal,
    10·2 answers
  • Which of the following North American peoples settled in the Arctic region?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!