1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
8

The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate

its telephone network is a _____.Select one:
a. Phone hacker
b. Hacktivist
c. [email protected]
d. phreaker
Computers and Technology
1 answer:
larisa [96]3 years ago
7 0

Answer:

It would have to be A, a phone hacker. A phreaker is someone who studies and experiments phones but doesnt hack companies.

You might be interested in
String member function compare compares two strings (or substrings) and returns 0 if:
Margarita [4]

Answer:

The correct answer for the given question is option(B). i.e the strings are equal.

Explanation:

String are the collection of characters.In the string compare function if both string are equal then it return 0 value otherwise it return non zero value.

if string 1 is greater then the string 2 then it return 1 . in c language

if string 2 is greater then string 1 then it return -1 in c language.

6 0
3 years ago
Adios brainly, you were sh.t sometimes, but you had your moments, wont be posting that much take my points away i d c
svlad2 [7]

you got a bad day today, bud?

3 0
3 years ago
Read 2 more answers
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
A skillful response consist of two parts: affirmation andanswer<br><br> True<br><br> False
antoniya [11.8K]

Answer: False

Explanation:

A skillful response is defined as, answering the response in a skillful manner with all the technical and skillful approach. Firstly, read the question carefully and answer according in a proper format manner. Affirmation and answer are not enough for the skillful response as, it also include various kinds of approach like it should be error free and declaration of the answer should be in format, meaningful and proficient.

7 0
3 years ago
Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
ddd [48]

Answer:

See explaination for program code.

Explanation:

inputFileName = input("Input filename: ") outputFileName = input("Output filename: ") inputFile = open(inputFileName, "r") outputFile = open(outputFileName, "w") count = 1 for line in inputFile: newLine = str(count).rjust(4, " ") + "> " + line outputFile.write(newLine) print(newLine) count += 1

4 0
3 years ago
Other questions:
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations. A. News sites B. Sear
    5·2 answers
  • Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
    15·1 answer
  • Function of network security​
    9·1 answer
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • Pls help............
    9·2 answers
  • Before desktop computers made italic fonts available in the home and office, writers used underlining to:
    12·1 answer
  • _____ refers to the physical components used to collect, store, organize, and process data and to distribute information
    7·1 answer
  • You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to
    13·1 answer
  • Select all the correct answers.
    6·1 answer
  • What is number system in computer language ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!