1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
15

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network

services, and/or sends attack instructions without entering the office or organization that owns the network.
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
4 0

Answer:

Drive-by hacking

Explanation:

Drive-by hacking simply put is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Hackers are always and constantly in need of ways to install malware on your computer. They of make use of email, shady executable files and Internet web pages. A drive-by download is one method that uses the Internet and web pages to install malicious software on your computer.

The aim is to to remotely attack your data either to steal information or to disrupt operations.

You might be interested in
Random integer between 3 and 13 (inclusive)
garri49 [273]

Answer:

6

Explanation:

5 0
3 years ago
Read 2 more answers
What are the two major categories of computer software? word-processing software and spreadsheet software applications software
Strike441 [17]
From this list, the most used software would be:

Word-processing software and spreadsheet software.
5 0
4 years ago
A robot can complete 7 tasks in hour. Each task takes the same amount of time.
bekas [8.4K]

Answer:

A. I believe is 8.57

B. Should be 7

Explanation:

Please forgive me if I'm wrong thats my best shot. However if i am right please mark brainliest

3 0
4 years ago
Read 2 more answers
Explain how data is represent in the computer system
Alex Ar [27]

Explanation:

<h3>Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.</h3>

7 0
3 years ago
Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
puteri [66]

Answer:

import java.util.Scanner;

public class num4 {

   public static void main(String[] args) {

     Scanner in = new Scanner(System.in);

     int sumOdds =0;

     int sumEvens =0;

     int num;

     do{

         System.out.println("Enter positive integers");

         num = in.nextInt();

         if(num%2==0){

             sumEvens+=num;

         }

         else if (num%2!=0){

             sumOdds+=num;

         }

     }while (num>0);

       System.out.println("The sum of evens: "+sumEvens);

       System.out.println("The sum of odds: "+sumOdds);

   }

}

Explanation:

  • Import Scanner class to prompt and receive user input
  • Declare the following variables and initialize them int sumOdds =0, int sumEvens =0, int num;
  • Create a do....while loop That continously prompts user to enter a positive number. The loop should terminate when a negative number is enters (n<=0)
  • Within the while loop use an if condition with the modulo (%) operator to determine even and odd numbers and add to the respective variables
  • Outside of the while loop Print sum of odds and sum of evens

5 0
3 years ago
Other questions:
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • If x window system is installed, linux users can use x11 forwarding to run __________ as they would on a windows computer. gui a
    11·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • En su cuaderno o carpeta de trabajo realice la conversión del sistema de numeración binario a octal según este ejemplo de manera
    13·1 answer
  • Data are sent through a network on bundles called _______. select one:
    8·2 answers
  • Use the drop-down menus to match the description to the correct audio-editing technique or term. deleting unwanted sounds increa
    14·2 answers
  • I AM GIVING BRAINLIEST!!!!!!! PLEASE HELP !!!!!!!!
    7·2 answers
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
  • Using AI to filter potential job applicants might be considered _____
    11·2 answers
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!