1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
2 years ago
15

You accidentally find someone's password and use it to get into a system. this is hacking.

Computers and Technology
1 answer:
Umnica [9.8K]2 years ago
4 0
I'd go with yes, but are you doing something malicious or just being nosey?
You might be interested in
Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
abruzzese [7]

In order to complete the series of substitution values from $35 to $45 in increments of $2.50, follow these steps:

  • Input $35 in B21.
  • Highlight B21 to B26.
  • Go to the Home tab.
  • Go to the Editing ribbon.
  • Click on Fill.
  • Click on Series.
  • Step Value = 2.50
  • Stop Value = 45.
  • Click Okay.

<h3>How can you complete a series of Substitution values?</h3>

First input the value you are to start with in the cell you are to start with. In this case that means putting $35 in Cell B21.

Highlight B21 to B26 and then go to the Home tab. Go to the Editing ribbon at the bottom right and click on Fill. Then go to Series and input the step value as 2.50 and the stop value as 45. Click okay and the range will appear.

Find out more on spreadsheet functions at brainly.com/question/1395170.

4 0
2 years ago
When you insert a photo into a document, its placed at the ​
Ray Of Light [21]

either in the doc its self or in the attachment file

5 0
2 years ago
Read 2 more answers
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
katrin [286]
False phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
6 0
3 years ago
Please help me with these questions
adelina 88 [10]

3. A, (first choice)

4. C (Third choice from top)


6 0
2 years ago
What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?
larisa86 [58]

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

8 0
3 years ago
Other questions:
  • Clip art, by default, is formatted as a(n) ____, which cannot be moved to a precise location on a page.
    14·1 answer
  • In this assignment, you are going to add conditional formatting to the spreadsheet you used in the previous
    13·1 answer
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • What is the difference between a key escrow and a recovery agent? (Choose all that apply.)
    12·1 answer
  • Was just testing how this works, no actual question; feel free to take the points anyways though. ​
    13·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • Cable Internet access can be described with which feature?
    5·2 answers
  • Я люблю есть гнезда петух
    11·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!