1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
6

What is computer hacking? describe some examples

Computers and Technology
1 answer:
Naily [24]3 years ago
3 0
Computer hacking<span> refers to the practice of modifying or altering </span>computer<span> software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
</span>
“bot,” is a computer under the control of a hacker <span>without the knowledge of the computer user.</span>

You might be interested in
Which of the following is the best reason to use a macro?: *
marin [14]

Answer:c)You want to automate a repetitive task to save time

Explanation: Macro is the program that is utilized when there is a requirement of a task or operation to be repeated in a automatic way.This helps in saving the time without commanding the same operation to take place manually.

This program works by taking the into and generating the preset output sequence. Other options are incorrect because it does not help in email functions, correction of the citation in documents or generation of the table.Thus, the correct option is option(c).

7 0
3 years ago
In the Stop-and-Wait flow-control protocol, what best describes the sender’s (S) and receiver’s (R) respective window sizes?
kolbaska11 [484]

Answer:

The answer is "For the stop and wait the value of S and R is equal to 1".

Explanation:

  • As we know that, the SR protocol is also known as the automatic repeat request (ARQ), this process allows the sender to sends a series of frames with window size, without waiting for the particular ACK of the recipient including with Go-Back-N ARQ.  
  • This process is  mainly used in the data link layer, which uses the sliding window method for the reliable provisioning of data frames, that's why for the SR protocol the value of S =R and S> 1.
3 0
2 years ago
So I try to login into my origin account and this popped up.(photo). But everytime I try to type in something I’m unable to clic
Oduvanchick [21]
You have to restart your computer or maybe use another internet browser to access the website your trying to reach
7 0
3 years ago
This standard library function returns a random floating-point number in the range of 0.0 up to 1.0 (but not including 1.0).
natulia [17]

Answer:

The answer would be A: Random

Explanation:

The random() function returns a generated random number (a pseudorandom number)

5 0
2 years ago
Which technique records a signal with a video that uniquely identifies every frame of the tape using a time stamp in hours, minu
Nookie1986 [14]

Answer:

NTSC, Timecode

Explanation:

NTSC was used for television broadcasting in the USA, and some other countries. And it archives a video signal that exceptionally deciphers every frame of the tape with the assistance of the time stamp in unit time and frames. We have other options as well, which are PAL and SECAM. However, now and since 2013, these are being converted into the digital. The frame rate of the NTSC in the US was 29.97 fps. And this defines how good video you are going to receive.

And timecode is the signal that is recorded with the video that can quite exclusively figure out each frame of the tape with the help of the time stamp in unit time and frames.

3 0
3 years ago
Other questions:
  • Which of the following locations is the option to show hidden files or folders location
    7·2 answers
  • What does AAC stand for?
    11·2 answers
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing
    15·2 answers
  • Henry is designing a document for his architecture project. In which order should Henry preform the different tasks that are req
    7·1 answer
  • A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that tak
    8·1 answer
  • Write the WordSandwich method allSandwiches. This method creates and returns a new array of String objects as follows. Each elem
    13·1 answer
  • Explain the reason why vector graphics are highly recommended for logo​
    5·1 answer
  • What permissions are needed in order to use a work online that is in the public domain?
    8·1 answer
  • The original programs awaiting tanslation is called​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!