1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
9

? An attempt to harm damage or cause threat to a system or network is broadly termed as

Computers and Technology
1 answer:
Radda [10]3 years ago
6 0

Answer:

A cyber attack or hacking

Explanation:

You might be interested in
This is used in a program to mark the beginning or ending of a statement, or separate items in a list:_____
hammer [34]

Answer:

B) Punctuation

Explanation:

Punctuation are greatly used in different programming languages for different purposes. In the Java, C++ and C# Programming languages for example, two popular punctuation marks are the comma (,) and semi-colon (;). The comma is used for separating elements of a list and arrays, while the semi-colon indicates end of an executable statement or line of code. Other popular punctuation marks used in programming are periods (dot), question marks, parenthesis angle brackets and braces each implementing a specific grammatical syntax in the language.

5 0
3 years ago
The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
dybincka [34]
It can be stress or drinking, drugs, or anything of the sort.
6 0
3 years ago
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
What is a deny all catch all
a_sh-v [17]

Answer: The default catch-all rules at the end of  are: block in log quick all label "Default block all just to be sure." block out log quick all label .

Explanation:

7 0
3 years ago
Is the following an example of social media viral marketing? Indicate your response by selecting yes or no. When you sign onto y
Vladimir [108]

Answer

yo im sorry give me points b

Explanation:

gasefe

3 0
3 years ago
Other questions:
  • Every information systems (is) user has the right to a secure computing environment. this means that the
    12·1 answer
  • G=D+(A+C^2)*E/(D+B)^3 Rewrite the above formula in terms of doing concurrent processing using cobegin and coend to identify thos
    12·1 answer
  • Virtually all webcams plug into a(n) ________ port.
    13·2 answers
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
    13·1 answer
  • Technological advances have made cyberbullying
    5·1 answer
  • While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cov
    10·1 answer
  • The project objective is the detailed description of the characteristics of the project. True or False?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!