1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
9

What laws are broken when you hack someone?

Computers and Technology
1 answer:
postnew [5]3 years ago
6 0

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

You might be interested in
A(n) __ is a list of main points and sub-points of a topic to include in a presentation
skad [1K]

Main points are  key ideas that support a thesis and helps an audience understand and remember what is most important about a speaker's topic, while sub points are supporting points like <span><span>examples, definitions, testimony, and statistics that support or illustrate a speaker's main points.
</span>A preview is a list of main points and sub-points of a topic to include in a presentation</span>


8 0
3 years ago
Read 2 more answers
Susan is in charge of the inventory reports for her company. She will need to find specific inventory items as well as project i
kati45 [8]

Answer:

FALSE.

Explanation:

Susan remains in control of the corporation's stock statements. this would have to identify different product products and raise production costs for the plant. to keep comfortable, build a spreadsheet then select the Research Software of the following application.

She has to use that search feature to locate the identical similarity to such the product object, such that the range lookup value is set to FALSE.

7 0
3 years ago
What are the similarities and differences between the sample résumés, in terms of content and formatting?
poizon [28]

Answer:

in general terms a sample resume would have less on it with more of a general overview,while a full resume has the whole 9 yards  

6 0
4 years ago
Which best describes TPM?
rodikova [14]

Answer:

Encryption used on hard drives

Explanation:

TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.

So, the best sentence that describes, TPM is Encryption built into hardware .

4 0
3 years ago
Which Numpy function do you use to create an array? (Points : 1) np
ra1l [238]

Answer:

The correct option is np.array

Explanation:

Numpy is a library to perform numerical calculation in python. It allows us to create and modify vectors, and make operations on them easily. Numpy arrays are an excellent alternative to python lists. Some of the key advantages of numpy arrays are that they are fast, easy to work with, and offer users the opportunity to perform calculations through full arrays.

To start using numpy, the library must be imported:

import numpy as np

The most common way to create a vector or matrix already initialized is with the np.array function, which takes a list (or list of lists) as a parameter and returns a numpy matrix. The numpy arrays are static and homogeneous typing. They are more efficient in the use of memory.

Example:

list = [25,12,15,66,12.5]

v = np.array (list)

print (v)

6 0
3 years ago
Other questions:
  • Which payment type is best if you are trying to sick to a budget?
    15·1 answer
  • What does microsoft recommend for large organizations requiring desktop virtualization for many clients? quizlewt?
    10·1 answer
  • Effective resource management: a. Locks out unauthorized access and can work to prevent changes to resources by internal users n
    8·1 answer
  • The process of recognizing information? needs, using efficient search techniques to locate reliable sources of? information, and
    9·1 answer
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • Write a program that simulates rolling one die using the following steps: 1. Prompt the user for the number of sides on the die.
    13·1 answer
  • Write a program to prompt the user to enter a fist name, last name, student ID and GPA. Create a dictionary called Student1 with
    8·1 answer
  • Key Categories: more libraries and thousands of functions
    5·1 answer
  • If someone you don’t know asks where you go to school, what should you do
    12·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!