1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
10

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha

t white-hat green-hat
Computers and Technology
1 answer:
Masteriza [31]3 years ago
3 0
<span>These are white-hat hackers. They are typically hired by the company doing the testing as a way of making sure that there are no bugs or holes in the code or program that could be exploited. The ethical hacker would look for ways to get around these issues and helps the company strengthen their programs or sites.</span>
You might be interested in
Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
ryzh [129]
Is known as the binary system
8 0
3 years ago
Read 2 more answers
A que generacion pertenecen los gadgets?
alukav5142 [94]

Answer:

English please

Explanation:

8 0
3 years ago
4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
meriva

Answer:

The reason we are more honest online is simpler than we think, says Hancock. In the past, before there was modern technology or even written language, people could lie to each other easily. Once the words were said, they disappeared. ... Technology therefore might make us more honest than ever

6 0
3 years ago
Read 2 more answers
3. with a dui charge on a driver’s record ______________. a. the price of his or her insurance greatly increases b. he or she ma
djyliett [7]
<span>The answer to your question is D. both A and C</span>
7 0
4 years ago
Quinn is opening an Excel workbook and receives an information bar and warning that the workbook contains macros. Quinn is promp
Andrew [12]

Answer:

Check where the file originates from, and if it is a trusted source or his own workbook, click Enable Content.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • 11. You should type _
    6·2 answers
  • 10. Question
    15·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • Which part holds the "brains" of the computer?
    13·1 answer
  • Write a method that computes the sum of the digits in an integer. Use the following method header: public static int sumDigits(l
    5·1 answer
  • A hard drive cannot be partitioned until the device <br> is set.
    10·1 answer
  • How is a WAN different from a LAN?
    10·1 answer
  • What are the four major software packages of microsoft​
    11·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the
    12·1 answer
  • 1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the scr
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!