1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
14

which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea

k into computers as long as they do not do any damage | D. are people who are allergic to computers | ​
Computers and Technology
1 answer:
AysviL [449]3 years ago
5 0

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

You might be interested in
WHO IS EXCITED FOR COLD WAR SEASON 1????
xxMikexx [17]

Answer:

me  iggggggg

Explanation:

7 0
3 years ago
Read 2 more answers
What technology provides secure access to websites
wlad13 [49]

The technology is HTTPS or Hypertext Transfer Protocol Secure

6 0
3 years ago
Read 2 more answers
Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following
creativ13 [48]

Answer:

Option B Is correct. It will fail without user commitment.

Explanation:

In the modern world, technology occupies an essential place. The technological tools in the industry today facilitate and expedite a huge amount of tasks, allowing automated work, mass production, software analysis, quality control, among others.

However, these tools can only work effectively when they are under the observation and supervision of trained human personnel, otherwise, a program designed to make 3D prints can fail, and without anyone to take action, it will cause a great waste of material, time and money.

5 0
3 years ago
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
JulijaS [17]
The fourth choice is correct.
5 0
3 years ago
Zina has been using computers all her life and has extensive knowledge about hardware and software. In this context, Zina can pr
NeX [460]

Answer:

Specific Attribute .

Explanation:

As zina has using the computer in all time of her life also has extensive knowledge about the hardware as well as software.zina will process the system when zina knowledge about the specific attribute of the computer these specific attribute may be component part of the computer system or any important part of computer  .The specific attribute is doing the specific job in the hardware as well as software .

So if information is stated in terms of the specific attribute Zina will  process the information about the computer .

8 0
3 years ago
Other questions:
  • The "edit" command must allow the user to find a record in the list by director. If there are multiple records with the same dir
    12·1 answer
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • The term “frivolous” implies that the author
    9·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • A representation of something by using a description, summary or image.
    7·1 answer
  • What are the different types of application architecture
    5·1 answer
  • Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do s
    13·1 answer
  • Some people recommend deleting social media accounts because of the troubling legal and ethical implications of social media. Do
    9·1 answer
  • Please help me plss! PLS​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!