1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
11

What is computer hacking?

Computers and Technology
2 answers:
bezimeni [28]3 years ago
8 0
<span>Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access information you really don't want them to have.</span>
Vlad1618 [11]3 years ago
3 0

we dont alwas download a virus sometimes we dont even need to get into your computer like a tech scammer we can get your info way easier than that method and computer hacking or hacking in any state is to output or input info into a device or server system by useing things like b***d h***d and other things like that

You might be interested in
The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
Strike441 [17]

The term is: transmission flush

8 0
3 years ago
Hey, how do we get our warnings removed? I got one and I didn't realize that what I did was wrong.
vodka [1.7K]

Sorry we can't remove our warnings

5 0
2 years ago
Read 2 more answers
Which of these Logic Statement's are correct for the following diagram? *
Solnce55 [7]

Answer:

A AND B OR C

Explanation:

7 0
3 years ago
Which subunit of a heterodimeric cdk is the regulatory subunit?
Lemur [1.5K]
The answer is cyclin subunit
8 0
2 years ago
Where do we draw the line between creativity and deception?
BARSIC [14]

Answer:

when you are manipulating the pictures for art and creativity purposes and not for changing your own or others appearance.

4 0
3 years ago
Other questions:
  • Algorithm for arithmetic mean program
    13·1 answer
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • How do you change the text style on brainly mobile ?
    12·1 answer
  • Each tab is divided into groups of related commands or buttons. T or F
    10·1 answer
  • How would you define data science ?
    10·1 answer
  • Which command displays the contents of the NVRAM?
    13·1 answer
  • The File method lastModified() returns
    10·1 answer
  • A human interest story is an example of hard news.<br> O True<br> O False HEL
    15·1 answer
  • You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
    9·1 answer
  • Como se llaman las herramientas y maquinas pque utilizan para hacer cosas artesanales
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!