1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
12

Hacking should only be used on the​

Computers and Technology
1 answer:
yaroslaw [1]3 years ago
5 0

Answer:

any device

Explanation:

I would say that because you can code on any device if thats what you mean. There are websites for coding and they are below

The best websites to learn coding

  • Codecademy.
  • Udemy.
  • Pluralsight (Code School)
  • Team Treehouse.
  • freeCodeCamp.
  • edX.
  • Udacity.

credit to mikkegoes . com

You might be interested in
_______ is the command for opening a spreadsheet object in a separate spreadsheet window. A. Edit > Edit Data B. Worksheet &g
marishachu [46]
I believe the correct answer would be option D. Worksheet Object > Open is the command for opening a spreadsheet object in a separate spreadsheet window. In Microsoft excel, you can simultaneously open two worksheets so you can observe them both. 
7 0
3 years ago
Read 2 more answers
How do you do this need help
almond37 [142]
You wouldhave to do it on your phone to screen shot it
5 0
3 years ago
Harvey is creating a presentation for his school project. He wants to have the same look on all the slides of his presentation.
Dimas [21]
<h2>Answer:</h2>

<u>Theme option in the design tab</u>

<h2>Explanation:</h2>

After opening his slides in power point he must click on the Design Tab and then selecting a theme from various options that come in front of him. He can select any theme and then click apply to all. This will allow him to apply the same theme over all his slides of presentation.

6 0
4 years ago
Read 2 more answers
What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
ICE Princess25 [194]

Answer:

copyright

Explanation:

3 0
4 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Other questions:
  • Which of the following is least likely checked by the comprehensive component monitor?
    7·1 answer
  • Function templates ___________.
    5·1 answer
  • To prevent injury when pulling a nail be sure the material holding the nail is
    14·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • True or False?
    8·1 answer
  • What is Brainly?<br><br> A.Yes<br> B.No
    12·2 answers
  • After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people
    7·2 answers
  • HELP ASAP IF YOU KNOW PYTHON 2!!!
    15·1 answer
  • Please help me, i need help
    15·2 answers
  • Which components are involved with input? Output? Processing? Storage?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!