1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
What did john Locke so that was so important ?<br> 30 POINTS PLEASE ANSWER CORRECTLY
Gre4nikov [31]
John Locke<span> was one of the most </span>important<span> and influential philosophers ever. The French Enlightenment drew heavily on his ideas, as </span>did<span> the Founding Fathers of the American Revolution. </span>John Locke<span> was born in 1632 into a well-to-</span>do<span> Somerset family.</span>
7 0
3 years ago
A child who considers a person's intentions, as well as the consequences of a given action, is in Piaget's ___ morality stageaut
Artist 52 [7]

Answer:

The answer is Piaget's autonomous morality stage.

Explanation:

The influential psychologist Jean Piaget believed that children developed their morality in stages. The first was the heteronomous morality stage (between 5 and 9 years) where morality is imposed from the outside largely by authority figures like parents and teachers. The autonomous morality stage begins at around age 9 or 10 when children begin to recognize there is no absolute right or wrong. Piaget observed that children at this stage tend to base moral judgments on the intention of the actor rather than the consequences of the actions . They also think of hypothetical circumstances that might affect whether a rule should be applied or not. At this age the peer group of the child widens and they learn more about the morality of others and their own ideas begin to change.  

5 0
3 years ago
What is the conditional expectation function or the population regression<br><br>function?​
Trava [24]

Answer:

E(Y | Xi) = f (Xi) is known as conditional expectation function(CEF) or population regression function (PRF) or population regression (PR) for short. In simple terms, it tells how the mean or average of response of Y varies with X

Explanation:

Hope it helps! Correct me if I am wrong :>

If you dont mind can you please mark me as brainlest?

8 0
3 years ago
Critics of the daily-hassles approach argue that knowing about a person's daily irritations and problems tells us nothing about
Kamila [148]

Critics of the daily-hassles approach argue that knowing about a person's daily irritations and problems tells us nothing about the person's coping abilities.

Answer: Option D

<u>Explanation:</u>

Person’s copying ability is also understood as mirroring in psychology where one person emulate speech pattern, body language, gesture or attitude as another person which may create irritations but exact reason cannot be estimated.

Daily irritations and problems tells us nothing about the person’s copying abilities because stress intensity result into irritations and may create further problems or problems creates stress and result into irritations but person’s copying abilities cannot be estimated by such phenomenon.

7 0
3 years ago
How long to cook frozen chicken tenders in instant pot
Assoli18 [71]

Answer:

about 15 minutes on high

8 0
2 years ago
Other questions:
  • When decoding a task, remember that all terms and phrases go with the ____________ learning pattern?
    7·1 answer
  • April bradley's arguments in favor of solar power are hardly worth listening to. after all, look where she graduated from—northe
    7·1 answer
  • The "ability to bring about an intended outcome" is an example of which approach to power?
    11·1 answer
  • What does this cave painting reveal about the society
    5·2 answers
  • In the civil war who was responsible for burning Atlanta and and the march to the sea
    9·1 answer
  • According to the elaboration likelihood model, the two main routes to persuasion are
    14·2 answers
  • For any particular location on Earth, why are lunar eclipses observed more frequently than solar eclipses?
    9·1 answer
  • Civil Engineering is a traditionally male dominated . Explain
    12·1 answer
  • Mavis is appearing before a judge for her first court appearance after being charged with carjacking. The judge allows Mavis to
    9·1 answer
  • 27. what neurotransmitter is especially involved in the functioning of memory, declines in late adulthood? a.norepinephrine b.se
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!