1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
14

When you hack a website, do you enter in the master code in the html section code data, or the offline/online system?

Computers and Technology
1 answer:
Alik [6]3 years ago
7 0
Html section code data
You might be interested in
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
With the evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security?
saw5 [17]

Answer:

RFID in a business setting as keycards to enter into specific rooms and Elevator control. RFID will eventually have more applications and security then Barcode.

Explanation:

6 0
4 years ago
Before you begin entering data in a worksheet, you should create a _____ for the worksheet.
DIA [1.3K]

Answer:

I'm pretty sure the answer is Template, But if I'm wrong sorry

Explanation:

3 0
3 years ago
Read 2 more answers
P2p networks are most commonly used in home networks. <br> a. True <br> b. False
postnew [5]
<span>The statement that P2P networks are most commonly used in home networks is true. 
</span>P2P stands for peer-to-peer communication network. It is an example of local administration. <span> Two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software with P2P type of network.</span>
6 0
4 years ago
10
Dmitrij [34]

Answer:

i need more \\

Explanation:

Chemical cold packs should be used for bone and joint injuries because they are generally colder than ice and stay cold longer.

A.  

True

B.  

False

Reset

4 0
3 years ago
Other questions:
  • To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.
    8·1 answer
  • if i were to buy one of these and plug it into a ps4 usb slot would i be able to see it on a tv? cause my hdmi slot on the ps4 i
    5·2 answers
  • 10 facts about turbines
    11·2 answers
  • 1. A thesaurus is best used to _____________.
    12·1 answer
  • Which of the following statements about programmed decisions is FALSE? a. Programmed decisions deal with repetitive situations.
    10·1 answer
  • In what way is your social media footprint related to your digital ID
    12·1 answer
  • Ill mark you the brainleist and give you 50 points if you wanna chat
    15·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark govern
    6·1 answer
  • How was kapilvastu named​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!