1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
8

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or

damage is called a(n) _____.
- activist cyber
- agitator hacktivist
- ethical hacker
- cybersquatter
Computers and Technology
1 answer:
Korolek [52]3 years ago
4 0

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

You might be interested in
How wireless communication might affect the development and implementations of internet of things?​
Alina [70]
If people send a link don’t try them report them!
5 0
3 years ago
Read 2 more answers
Supply is a powerful force in a free market.
Greeley [361]

Answer:

Input prices, number of sellers, technology, natural and social factors, and expectations.

Explanation:

Input in prices: When the prices go up supply will fall because lower quantities will be demanded.

Number of sellers: When the number of sellers are more, it will affect sales which is supply.

Technology: This helps in making supply to be properly done. Latest technology such as waybill, email, uber drivers, dispatch via logistics companies, shipment, air cargo carriers and a lot more.

5 0
4 years ago
Read 2 more answers
When you display the backstage info section, you cannot manually change which property
Lunna [17]

File. Hope it helps

6 0
4 years ago
Read 2 more answers
Briefly describe the concept of network topology change and explain how these can be dealt with using Routing Information Protoc
Natasha2012 [34]

Answer: network topology is the arrangement of nodes which includes routers and switches so that enables connection between the server and the client.

however due to times when there is huge traffic in the nodes there needs to be an optimal path for the exchange of information which is accomplished by different routing protocols.

Explanation:

Routing Information Protocol(RIP) is one such protocol which enables to route packets from the source to the destination having the least possible traffic along its path. There are two sets of routing algorithm which are

1. Static routing protocols

2. Dynamic routing protocols.

The difference between the two is that dynamic routing protocols helps to construct the routing tables dynamically as compared to static routing.

RIP is a type of dynamic routing whereby it sends the contents of its routing table the adjacent routers every 30 seconds and whenever a route is discarded from the routing table it is marked as unusable.

RIp is supported by almost all routers and also supports load balancing which is one of it advantages.

8 0
3 years ago
You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short pe
frutty [35]

Answer:

Guest account

Explanation:

When a consultant is accessing a network for a while and needs limited access to it, A Guest account should be given. This help keep your data and information save both now and in the future.

A guest account is an account with limited access and permission to a network over a specific period of time.

7 0
3 years ago
Other questions:
  • What causes the lens of the camera to extend or retract
    6·2 answers
  • True or false
    7·1 answer
  • Rather than a single address, you can refer to an array using their first (top/Left) and last (bottom/right) addresses separated
    15·1 answer
  • What are use class diagram, use case description and activity diagrams for use cases?
    7·1 answer
  • What is an LMS and how is it used?
    8·1 answer
  • Give fields descriptive so that you can easily identify them when you view or edit records.
    13·1 answer
  • What are 6 steps to take to figure out what's wrong with your computer?
    5·1 answer
  • Which of the following is the best name for a history report about World War I?
    7·2 answers
  • Energy is required in order to produce any sound.<br> true<br> false
    15·2 answers
  • GIVING 50 POINTS!
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!