Answer:
Damage and chaos. ...
An ego stroke. ...
Monetary or information gain. ...
Stealth. ...
Prevention.
To take control of a computer and use it for specific tasks.
To generate money.
To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
To cripple a computer or network.
Explanation:
True
----------------------------------
Answer:
there is no car on a bus a bus is one long vehicle
Explanation:
Answer: The valuable, precious, or expensive items.
Explanation:
nu it would not but if they call microsoft to check it then yez the history would show up for them but dont try to make it notice able so they dont have to call