1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
14

______ is an example of unauthorized access to your computer or accounts.

Computers and Technology
1 answer:
pychu [463]3 years ago
4 0
Well, it wouldn't be Adware because that just has to do with ads and stuff...
It wouldn't be cookies either because they just store things to make life easier.

It would be between Phishing and Hacking. I don't think it's Phishing because that's tricking someone into giving them your account information.

I think it would be hacking.

I hope that this helps. If it does, please rate it as Brainliest :D


You might be interested in
Which programming term describes the various characteristics of an object, such as its size and color?
SashulF [63]

Answer:

A

Explanation:

6 0
3 years ago
Whats happens when you add the numbers 1 and 1 together (1+1)<br> 11<br> 32<br> 2<br> 9
Neko [114]

Answer:

2

Explanation:

The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.

6 0
2 years ago
Inherent flaws in system software code are called:
antiseptic1488 [7]
It is called vulnerabilities 
7 0
3 years ago
In two to three sentences, describe how you would move a file.
Ksivusya [100]
First you locate the file you want to move. Then you can click and drag the file to the desired location.
hope this helped
6 0
3 years ago
In the United States, the government controls and owns a very large percentage of the media.
jeka94
True they can pretty much see anything you do and on top of that they can look through your cameras. thats why i keep tape on my camera on my laptop
6 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • Jenny wants to create a résumé after a two-years gap. What should she consider?
    11·2 answers
  • Write a program that displays in the title of the window the position of the mouse as the user moves the mouse around the window
    5·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    7·1 answer
  • Tower Building Activity
    12·1 answer
  • In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
    7·1 answer
  • Which lighting direction is used to create silhouettes
    15·1 answer
  • Bob has 2 candy bars he is fat what hapennes
    5·2 answers
  • What is the key difference between a class and an object
    12·1 answer
  • True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!