1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
8

The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate

its telephone network is a _____.Select one:
a. Phone hacker
b. Hacktivist
c. [email protected]
d. phreaker
Computers and Technology
1 answer:
larisa [96]3 years ago
7 0

Answer:

It would have to be A, a phone hacker. A phreaker is someone who studies and experiments phones but doesnt hack companies.

You might be interested in
People without digital literacy skills are often the victims of
Arturiano [62]

scams or identity fraud

7 0
4 years ago
How can a PowerPoint user add a shadow to a table
damaskus [11]
Https://wordribbon.tips.net/T010192_Drop_Shadows_for_Tables.html
8 0
3 years ago
An artificial satellite in which people can live and work for long periods is called a
morpeh [17]
A space station is an artificial satellite in which people can live and work for a long period of time. Space station is placed on the space for the astronaut in researching things on the space and universe.
8 0
4 years ago
Read 2 more answers
Guidelines on how to write a report on how technology has affected office duties
UNO [17]

Answer:

weweweweweewewwewweewewweeew

Explanation:

weweweweewweweweewweewweewewew

5 0
3 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a numbe
Cerrena [4.2K]

def miles_to_laps(mi):

   return f"{mi} mile(s) is {mi/0.25} lap(s)"

print(miles_to_laps(1))

I wrote my code in python 3.8. I hope this helps!

6 0
3 years ago
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • Like Tess, Brina has a fascinating job! She works as a software engineer with Instagram. She says that Computer Science is a way
    10·2 answers
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • Which statement is FALSE? If a method does not return a value, the return-value-type in the method declaration can be omitted. P
    8·1 answer
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Which of the following is not an example of a technological aid?
    11·1 answer
  • Software that tries to monitor and track the way you use your computer.​
    10·2 answers
  • Identify the symbol. please help!!<br>​
    7·2 answers
  • What is the process that creates a shortcut on your taskbar?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!