1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
2 years ago
9

PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!

Computers and Technology
1 answer:
svet-max [94.6K]2 years ago
4 0

Answer: Computer Hacking generally refers to unauthorized intrusion into a computer. One example is Trojan which is  malware disguised as harmless software. Another example is Rootkits, malicious segment of code injected into your computer system, designed to hide any unauthorized activity taking place.

Effects: Identity theft and email access

Consequences: one year in prison and a $100,000 fine.

Explanation:

You might be interested in
DO MOBILE DEVICES HAVE TO WORK IN LIMITED SCREEN SPACE
Taya2010 [7]
Yes, mobile devices have to work in limited screen space.
8 0
2 years ago
Read 2 more answers
________ is a record in a relational database.
leonid [27]

The answer that is a record in a relational database is called; A row

<h3>What is a record in relational database?</h3>

In relational databases, a record is defined as a group of related data held within the same structure. Furthermore, we can say that a record is a grouping of fields within a table that reference one particular object.

Now, in relational database, a row is called a record because each row, contains a unique instance of data or key for the categories defined by the columns.

Read more about Relational Database at; brainly.com/question/13262352

#SPJ12

4 0
1 year ago
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, int, long, float and double.
Rudik [331]
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, not, long, float, and double. all other types are REFERENCE types
4 0
2 years ago
Picture question please help me
cluponka [151]

Answer:

where is the picture?????

6 0
2 years ago
Read 2 more answers
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
2 years ago
Read 2 more answers
Other questions:
  • Look at the circuit shown in the figure above. Switch S1 is open as shown, and R1 and R2 each have a value of 100 k. If you conn
    11·1 answer
  • Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
    15·2 answers
  • The world wide web was originally conceived of as a(n) _____.
    14·1 answer
  • Janice, who is 15, posts post a picture of herself drinking alcohol and making an obscene gesture on her social network page. wh
    15·2 answers
  • The method for updating the main memory as soon as a word is removed from the cache is called
    10·1 answer
  • How can the function abcfunc change the address in its local copy of intpoint?
    11·1 answer
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • Convert pounds to ounces.
    11·2 answers
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!