1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
3 years ago
9

PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer: Computer Hacking generally refers to unauthorized intrusion into a computer. One example is Trojan which is  malware disguised as harmless software. Another example is Rootkits, malicious segment of code injected into your computer system, designed to hide any unauthorized activity taking place.

Effects: Identity theft and email access

Consequences: one year in prison and a $100,000 fine.

Explanation:

You might be interested in
Which of the following is not a true statement? You can import a table or a query directly from an Access database into an Excel
Lilit [14]

Answer:

does anybody know this answer?

Explanation:

no nobody does

5 0
3 years ago
Which of the following is an external hard drive
fredd [130]

Answer:

Question 1 = D

Explanation:

7 0
3 years ago
I don't know how to explain what is motion in my own words
marusya05 [52]
Motion is the movement of a body part or an object
8 0
3 years ago
Read 2 more answers
How dependent are we on technology? ​
rusak2 [61]

very independent  : ) we use it for everything

3 0
3 years ago
Read 2 more answers
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Other questions:
  • Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
    11·1 answer
  • Which of the following should NOT be done to keep people from slipping on floors? A) Have the proper absorbents in an easy-to-fi
    12·2 answers
  • Question 2 of 5
    8·1 answer
  • Whic flag has a special role in debuging
    6·1 answer
  • Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe
    8·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • What are the specifications for a mine shaft headgear ​
    10·1 answer
  • Where to store <br> ammunition
    5·1 answer
  • Define a function that will return the length of a list
    5·1 answer
  • The second generation of computer languages is a higher-level language than
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!