1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
12

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed

to do so?
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
8 0

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

You might be interested in
What is edge computing?
WINSTONCH [101]

Answer:

Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.

Explanation:

5 0
2 years ago
Which symbol shows an input?
LenaWriter [7]

Answer:

Document symbol

Explanation:

This symbol is shaped like a rectangle with its bottom side in a wave, and it is used to represent the input or output of a document. For instance, this symbol might be used to outline a document input, such as receiving an email or report.

hope it helps

mark me brainliest pls

8 0
2 years ago
Versiones del Moodle
SIZIF [17.4K]

Answer:

Moodle 3.1 (LTS), Moodle 3.1, Moodle 3.1.1, Moodle 3.1.2, Moodle 3.1.3, Moodle3.1.4

4 0
3 years ago
Additional rows and columns are inserted into a table using the
Paladinen [302]
The Option D , Table Tools Insert
6 0
2 years ago
What does it mean when your phone says system ui has stopped?
wel
It means hat the CPU is taking o much of what the phone can normally do try delete some apps or close apps your not using 
8 0
4 years ago
Other questions:
  • How to save customised keyboard shortcuts on word
    11·1 answer
  • What width would you choose for the pdf?
    12·1 answer
  • How many different passwords are possible if each character may be any lowercase letter or digit, and at least one character mus
    6·1 answer
  • Complete the sentence. <br><br> ____ Is the study and use of very small technology units
    14·1 answer
  • A communications medium that carries a large amount of data at a fast speed is called
    14·1 answer
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • 4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first chara
    10·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
  • How to get the whole number of a fraction in python
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!