1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
4 years ago
6

A hacktivist is someone who _______.

Computers and Technology
1 answer:
andreev551 [17]4 years ago
6 0

Answer:

A hacktivist is someone who <em>hacks computers or Web sites in an attempt to promote a political ideology</em>

Explanation:

Computer hacking is the process in which attacker or outsiders try to access the data of the company or some personnel data to damage the reputation.

Now a days, computer hacking in terms of politics is also adopted by different attackers to damage the reputation of some politician. <em>This type of hacker are called hacktivist.</em>

You might be interested in
Finding your style in photography is about ___
marusya05 [52]
Only B and C would be the best choice
7 0
3 years ago
Read 2 more answers
You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
vampirchik [111]
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

7 0
3 years ago
Implement the function is_maxheap which takes a list of integers and returns True if the list represents a valid max-heap, and F
harkovskaia [24]

Answer:

I am writing a Python function:

def is_maxheap(list):

   #finds the length of the list  

   size=len(list)

   #loop has a variable i which starts traversing from root til end of last #internal node

   for i in range(int((size - 2) / 2) + 1):  

       if list[2 * i + 1] > list[i]:  #If left child is greater than its parent then return #false  

               return False  

       if (2 * i + 2 < size and

           list[2 * i + 2] > list[i]):    #checks if right child is greater, if yes then #returns false  

               return False

   return True

Explanation:

The function is_maxheap() traverses through all the internal nodes of the list iteratively. While traversing it checks if the  node is greater than its children or not. To check the working of this function you can write a main() function to check the working on a given list. The main() function has a list of integers. It then calls is_maxheap() method by passing that list to the function. The program displays a message: "valid max heap" if the list represents valid max-heap otherwise it returns invalid max heap.

def main():

   list = [10,7,8]  

   size = len(list)  

   if is_maxheap(list):

       print("Valid Max Heap")  

   else:  

       print("Invalid Max Heap")          

main()

The program along with its output is attached in a screenshot.

5 0
4 years ago
In Shoreville, the last low tide was at 12:00 a.m. About what time will the next high tide occur?
Oliga [24]
6 pm they happen every 12 hours

4 0
3 years ago
Read 2 more answers
If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your
motikmotik
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

3 0
4 years ago
Other questions:
  • Which set of steps will organize the data to only show foods with more than 100 calories and rank their sugar content from great
    8·1 answer
  • Insurance can help you:
    10·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • What is the protocol developed for the wireless network communications? explain?
    8·1 answer
  • John buy cheap stolen rims for his new truck?
    11·1 answer
  • Give the an example of the following .<br>a.)typing software<br>​
    10·2 answers
  • (50 POINTS)
    12·1 answer
  • What is the accurate description
    12·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!