1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
11

What is computer hacking?

Computers and Technology
2 answers:
bezimeni [28]3 years ago
8 0
<span>Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access information you really don't want them to have.</span>
Vlad1618 [11]3 years ago
3 0

we dont alwas download a virus sometimes we dont even need to get into your computer like a tech scammer we can get your info way easier than that method and computer hacking or hacking in any state is to output or input info into a device or server system by useing things like b***d h***d and other things like that

You might be interested in
Three homework questions I can't figure out, please help?
Burka [1]

It A

iT b

YOU CANT TRY THE TWO ONE THE WHO ARE WRITE

8 0
2 years ago
The amount of data that can be stored on a disk depends in part on_____.
MariettaO [177]
To what it seems like, it’s d
8 0
3 years ago
Which is the correct expansion of the term Internet?
dem82 [27]

Answer:

international network is the answer

6 0
3 years ago
Read 2 more answers
Which of the following identifies the patterns used for each data series in a chart?
Lady_Fox [76]
The answer is A)Legend.
7 0
3 years ago
What is the main goal of computer generated by digitalization
mars1129 [50]

Answer:

for better future and attractive human life

4 0
3 years ago
Other questions:
  • Which amendment discussed in the unit do you think has the greatest effect on your life? Why?
    14·1 answer
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
    5·1 answer
  • What menu allows you to look up a command and learn how to use it?
    14·1 answer
  • What is the letter for the trash directory on windows 10?
    13·2 answers
  • If you tap or click the increase font size button too many times and make the font size too big, you can tap or click the _____
    9·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • ____ the styles allows the designer to start from a known baseline, confident that no unwanted styles will creep in from any bro
    6·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!