1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
15

If I were to install python in kali linux on a Acer 11 Chromebook and C730 would I be able to hack python with it since I have n

o access to linux beta to use python does anyone know if I could do that Instead?
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
5 0

Python isnt usually used for hacking because of it not being compiled and being slow etc. But with the correct code and training you should be able to hack with it if thats what you mean.Sorry for giving a low quality answer but your question should be clarified more.

You might be interested in
What is a network externality? Select one: a. It refers to having a network of suppliers and buyers for a good or service. b. It
gregori [183]

Answer:

c. It refers to a situation in which a product's usefulness increases with the number of people using it.

Explanation:

Network externalities also called demand-side economies of scale refers to the increasing utility that a user derives from the consumption of a product such that as the number of people who consume the product increases.

This phenomenon can also lead to a situation known as natural monopoly.

7 0
4 years ago
In which setting would you be least likely to find a full-time A/V technician?
pshichka [43]
It's B) Restaurant.....
5 0
3 years ago
Read 2 more answers
Select all that apply. How do you save presentations?
Len [333]

Answer:

it's number 3 if I remember for Microsoft Excel

Explanation:

click “File” from the menu in the top left-hand corner of Excel. Then click “Save As

3 0
3 years ago
Ashley has many interests. She likes to read, listen to music, and play soccer with her friends. But her favorite thing to do is
attashe74 [19]

ashley has a lot of interests

7 0
3 years ago
Which Space tool would be used to travel to Mars and explore its dangerous surface?
Blizzard [7]

It's the Space Probe

4 0
3 years ago
Read 2 more answers
Other questions:
  • Refer to the exhibit. what is the administrative distance value of the route for router r1 to reach the destination ipv6 address
    9·1 answer
  • Super Easy !!! Which of the following is one of the most primary maintenance steps for software?
    12·2 answers
  • You want to print only the fourth page of your research document. What would you do?
    9·2 answers
  • Malware that is spread through security warnings or advertisements for antivirus software is known as
    5·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    15·1 answer
  • Which of the following sections of a business plan comes first but should be written last?
    11·2 answers
  • Which of the following activities are performed by computer programmers? Choose all that apply.
    5·1 answer
  • What is the component on the motherboard that confirms all devices are in working order once the computer is turned on?
    13·1 answer
  • Cuáles son las redes sociales que más utilizas tú y tu familia. Describe su utilidad.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!