1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t

o cover her tracks. what general term describes susan's actions?'
Social Studies
2 answers:
Mariulka [41]3 years ago
7 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

igomit [66]3 years ago
6 0

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


You might be interested in
The recipes commonly used in countries with hot climates are more likely to include ________ than those in countries with colder
Mashutka [201]

Answer:

I want to say B- spices but I'm not 100% sure. I'm so sorry if its wrong.

3 0
3 years ago
Why Dr.Seuss know for making mockery of people from other races
Mice21 [21]
..........Wym how...........✨
5 0
3 years ago
Read 2 more answers
What is the most common method of measuring the economic development of a country?
Kisachek [45]

Answer:

GDP commom method of measuring economic development .GDP Refers to the monetary value of goods and services produced within the boundaries of a country period of a time.

8 0
3 years ago
When parents are unable to resolve the conflicts between them, a common pattern is to continue to argue through the children. Wh
grigory [225]

Answer:

cross-generational coalition between mother and child

8 0
3 years ago
One status tends to take rank above all others. The status that plays the greatest role in shaping a person’s life and determini
Crank

Answer:a master status

Explanation:

A master status refers to a position that an individual holds within society ,how each person considers themselves when they relate to others in terms of their title.

It is your social identity that has an impact on the role that you play within the society

For example a firefighter ,teacher and policeman all have their own roles and titles within society.

It is also mainly shaped by our surrounding environment and interactions.

4 0
4 years ago
Other questions:
  • Why do cats bring dead animals because they think you can't fend for yourself?
    10·1 answer
  • Which of the following programs was President Roosevelt establishing when he spoke these words?
    9·2 answers
  • All of the colonies had the same form of government. True False
    9·2 answers
  • The teacher expectancy effect occurs independently of a student's actual ability. what explains this effect?
    15·1 answer
  • In order to learn about children’s toy preferences, researchers interview children at a local preschool and base their inference
    11·1 answer
  • Weakness of articles of confederation
    13·1 answer
  • Explain the outcome of the Scopes trial plz
    6·2 answers
  • 1) How are governments with an economy a lot like parents with a child?
    9·1 answer
  • 2. Transactional Model Diagram:​
    12·1 answer
  • jim recently received a large inheritance from a distant relative. based on research, it can be expected that: please choose the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!