1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
15

2 reasons why someone might want to alter data on someone else’s computer

Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
6 0

Answer:

1. Looking at someone else's files.

2. To hack into the bank's computer and wanting to increase the amount in your account.

You might be interested in
What is an objective of state-sponsored attackers?
Keith_Richards [23]

Answer:

The correct answer is 2. To Spy on citizens

Explanation:

State-sponsored attackers have particular objectives aligned with either the political, commercial or military interests of their country of origin. Investigation shows that “the reality is that if a determined, state-sponsored adversary wants your data, they’re going to get it unless another state-sponsored entity helps you defend it.”

7 0
3 years ago
What does CTR stand for?
ipn [44]

click through rate is the answer


6 0
3 years ago
Read 2 more answers
Setting the isShowing property to false of the opacity property to o will delete an object from an Alice world.
Tema [17]
I think true I’m not for sure
5 0
3 years ago
Read 2 more answers
CIST 1122 Project 2 Instructions
NikAS [45]

Answer:

it is suppost ro be at

least 20 tb

Explanation:

5 0
2 years ago
All of the following are forms of verbal communication except
Radda [10]
B. hand gestures
these are not verbal.
4 0
2 years ago
Read 2 more answers
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    6·1 answer
  • If a person sends email from a school computer or a business computer, should that message be considered private?
    8·2 answers
  • The exponential distribution is often used to model what in a queuing system?
    12·1 answer
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • Supporting mobility and smartphone apps is important to MasterCard. What challenges does MasterCard face in rolling out smartpho
    11·1 answer
  • EASY POINTS who is your favorite in family<br> 1. mom<br> 2. dad<br> 3. sister<br> 4. brother
    10·2 answers
  • Tyra is peer conferencing about her project with a friend. Tyra's friend provided feedback that Tyra does not agree with. What s
    6·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!