1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
9

? An attempt to harm damage or cause threat to a system or network is broadly termed as

Computers and Technology
1 answer:
Radda [10]3 years ago
6 0

Answer:

A cyber attack or hacking

Explanation:

You might be interested in
Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
JulijaS [17]

left[0]=a[0];

for(int i=1;i<=n-1;i++)

   left[i]=(left[i-1]*a[i])%M;

right[n-1]=a[n-1];

for(int i=n-2;i>=0;i--)

   right[i]=(right[i-1]*a[i])%M;

for query q

   if(q==0)

       return right[1]%M;

   if(q==n-1)

       return left[n-2]%M;

   return (left[q-1]*right[q+1])%M;

4 0
2 years ago
Operands may be any of the following: (select all that apply) Group of answer choices constant or constant expression register n
attashe74 [19]

Answer:

constant or constant expression

register name

variable name (memory)

Explanation:

Literally, operand means data which an operation can be performed on. The operation could be an arithmetic or logical operation.

From the list of options, several operations can be performed on:

  • constants e.g. \pi = 3.14
  • registers and
  • variables e.g. (a + b)

<em>However, no operation can be performed on keywords and/or reserved words.</em>

3 0
3 years ago
The Backstage view is where you can see information and options pertaining to the user account and settings. How is the Backstag
Georgia [21]

Answer:b) Mail settings can be changed under the options menu

Explanation: I fr just guessed so y’all can have an answer and I ended up getting it rights

6 0
2 years ago
Which one is the correct answer
STatiana [176]

the right anwser is d


3 0
3 years ago
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • Write the definition of a method printAttitude, which has an int parameter and returns nothing. The method prints a message to s
    8·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • What is the main feature of Ethernet over Power?
    9·1 answer
  • What does NCR stand for
    12·2 answers
  • Which is technologically backward country? Options United States U K CHILE INDIA
    14·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Where are the results from the Advanced Find feature displayed?
    6·1 answer
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
  • Question 8 of 10
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!