1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
7

_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.

Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
6 0

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

You might be interested in
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Which image property helps to create distinction between the highlights and shadows of an object?
Nutka1998 [239]
I know filters, so I know it is Saturation.
6 0
3 years ago
Read 2 more answers
Can an engine run on air? I think it can, but I am not sure
Svetlanka [38]

Hello,

NO, and engine can run on steam, gas and other things but not air.

-Bella

3 0
3 years ago
Read 2 more answers
Javascript is an object-based programming language that involves working with the properties and methods associated with objects
dimulka [17.4K]

Answer:

True

Explanation:

You can set variables and make method functions.

4 0
2 years ago
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or
Artyom0805 [142]

Answer:

A. Do not use computer access or the Internet for unprofessional or inappropriate purposes.

7 0
3 years ago
Other questions:
  • As you are researching RAM for a computer you are building that will be used as a home office server for his small business. The
    5·2 answers
  • The expectations I would discuss with Erica regarding the usage of the internet
    6·1 answer
  • Controlling the physical world with sensors and digital devices depends on bandwidth and the ability to analyze data in real tim
    5·1 answer
  • _____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
    15·1 answer
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • What are the primary benefits of relying on systems development standards?
    7·1 answer
  • _______ make up the basic structure of a relational database with columns containing field data and rows containing record infor
    6·2 answers
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software com
    15·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!