1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
8

The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate

its telephone network is a _____.Select one:
a. Phone hacker
b. Hacktivist
c. [email protected]
d. phreaker
Computers and Technology
1 answer:
larisa [96]3 years ago
7 0

Answer:

It would have to be A, a phone hacker. A phreaker is someone who studies and experiments phones but doesnt hack companies.

You might be interested in
Units of distance on a computer’s screen are measured in microns.
Trava [24]

Answer:

true

Explanation:

why xzuse

5 0
3 years ago
I'm programming in javascript, I tryed to put a code like this, but it doesn't work. could someone help me?
VMariaS [17]

Answer:

Your computer does not support this code because you have put spaces in between the code, or maybe that is how you have written the question.

6 0
3 years ago
You can sort data in a table or_____?<br><br><br> A. Report<br> B. Form<br> C. Field<br> D. Record
Mazyrski [523]

Answer:I believe its form

Explanation:

7 0
3 years ago
Read 2 more answers
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
ILL GIVE BRAINLIEST You are taking a photograph of a valley and want to draw attention to a hamlet hidden amid the hills. Which
lana [24]
Answer: A
Explanation: Because it’s close to the hamlet but not blocking it like option B or drawing attention away from it like option C or D
Hope this helps!
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • Which files track internet usage and personal information when people visit websites?
    14·2 answers
  • As in algebra, you can use brackets to override the order of operations Excel follows to perform formula calculations. True or f
    13·1 answer
  • How do design elements and color work together on a web page?
    15·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
    12·1 answer
  • Which of the following is the biggest issue facing wireless communication today?
    5·1 answer
  • Explain ONE negative outcomes of not matching an ICT product to the correct audience:
    15·1 answer
  • The term used to describe an OS designed mainly to share network resources.
    10·1 answer
  • An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity o
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!