1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
4 years ago
11

(BRAINLIEST QUESTION!!!)

Computers and Technology
1 answer:
docker41 [41]4 years ago
4 0

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

You might be interested in
Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
Crazy boy [7]
In Windows a (real) backslash is a path separator. The % is involved with DOS variables.
4 0
3 years ago
!! HELP PLZ !!
DochEvi [55]
I think it might be short range and long-term
3 0
3 years ago
Read 2 more answers
Explain the difference between computer and computer systems.
9966 [12]

Answer: Computer commonly consists of HARDWARE and SOFTWARE. HARDWARE are the physical parts of the computer like keyboard, mouse, hard disk, processor, ram and Rom etc. SOFTWARE is the set of instructions that tells the computer what to do, For example Windows operating system, MS Word, MS Excel, Norton Anti virus all are software.

Explanation: plz add me as Brainiest

5 0
3 years ago
Which of the following best describes the basic purpose of the internet?
Julli [10]
The answer is B! Hoped this helped!
6 0
3 years ago
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
OLga [1]

Answer:

#1?

Explanation:

Might be wrong..

5 0
2 years ago
Read 2 more answers
Other questions:
  • Local variables:
    7·1 answer
  • Is brainly down? Cant search anything
    8·1 answer
  • Clicking a _____ name opens a drop-down list of commands and options.
    6·1 answer
  • What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
    11·1 answer
  • In Shoreville, the last low tide was at 12:00 a.m. About what time will the next high tide occur?
    8·2 answers
  • Which of the following is not one of the Fatal Four events that cause three out of five construction worker deaths? A. Caught in
    8·2 answers
  • Can someone please help me
    11·1 answer
  • Super computer in nuclear energy ​
    13·1 answer
  • FREEE POINTS
    8·2 answers
  • I need help ASAP which option is an example of a resource that would most likely become a constraint in building a game
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!