1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
15

_____ are skilled computer users who try to gain unauthorized access to other people’s computers.

Computers and Technology
1 answer:
Illusion [34]3 years ago
6 0
Hackers would be da  answer

You might be interested in
the advertisement below is an example of a(n) the advertisement below is an example of a(n) informative advertising objective pe
vlabodo [156]

The advertisement below is an example of an <u>informative advertising</u>. Thus, option A is the correct option.

<h3>What is informative advertising?</h3>

Utilizing facts to highlight the advantages of a product's features rather than pandering to consumers' emotions is used in informative advertising.

Any advertisement has one main objective: to sell products. The choice of methods represents the only distinction. To achieve a particular objective, each of them offers unique opportunities. Additionally, different industries seem to benefit from particular techniques more than others.

Through the use of data and statistics that demonstrate the worth and applicability of a product, informative advertising attempts to influence a user's choice. The ability for users to verify any statement is crucial. Consumers are therefore more likely to trust a company when they are informed, and this increases the authority of brands.

Learn more about informative advertisement

brainly.com/question/15734780

#SPJ4

4 0
2 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
1. The________  member function moves the read position of a file.
emmasim [6.3K]

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

8 0
3 years ago
What process combines data from a list with the content of a document to provide personalized documentsWhat
Morgarella [4.7K]
Mail merge can combine data with the content of a document to make personalized documents.
6 0
3 years ago
Read 2 more answers
Write an input command using the variable company_name.
Oxana [17]

Answer:

company_name = input("What if your company name?");

print("I hope " + company_name + "becomes successful!");

Explanation:

The input of the user becomes a variable which is then stored in order to print it out as a message.

4 0
3 years ago
Other questions:
  • Select the correct answer.
    8·1 answer
  • Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
    10·2 answers
  • Television has greatly influenced how politicians are perceived via the sound bite and ________ campaigning.
    11·1 answer
  • Keep getting the message i failed to sign in to email on my phone but i can open my email. whats going on?
    10·2 answers
  • Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 400 mse
    9·1 answer
  • Jim lost his job due to the replacement of robots in a manufacturing factory. As an ethical practice, what should the manufactur
    13·1 answer
  • "Jan23" can be stored using which data type? O an alphanumeric string O a boolean operator o characters floating point numbers​
    13·2 answers
  • Factors to consider when selecting an operating system to install in a computer ​
    7·1 answer
  • What note for percussun is this??
    12·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!