1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
14

which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea

k into computers as long as they do not do any damage | D. are people who are allergic to computers | ​
Computers and Technology
1 answer:
AysviL [449]3 years ago
5 0

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

You might be interested in
Explain how principles of computer programming are applied in different languages to produce
sweet-ann [11.9K]

Answer:

Principles of computer programming are applied in different languages to produce  software applications is described below in detail.

Explanation:

The main types of programming languages are:

  • Functional Programming Language.
  • Scripting Programming Language.
  • Logic Programming Language.
  • Procedural Programming Language.
  • Object-oriented Programming Language.

The programing language authorizes us to write dynamically programs and advance online explications such as- Games, web applications, and mobile applications, etc. Programming is employed to assemble, maintain, automate, measure, and interpret the processing of the data and knowledge.

7 0
3 years ago
_____ is a valid URL, or internet address. In this URL, ______ indicates the protocol.
Natalija [7]

Answer:

1. B.http://www.example.com

2. A. http

Explanation:

7 0
3 years ago
What is a characteristic ofa good cloud-based hosting?
Aliun [14]

Answer:

Explanation:

A good cloud-based hosting has many beneficial characteristics, some of which include on-demand self-service, broad network access, and being very elastic and scalable. These characteristics allow for a large number of users to benefit from the service at any time of the day and at a very fast speed due to the broad network access.

6 0
3 years ago
The act of driving around an area while running a laptop configured to detect and capture wireless data transmissions.?
jasenka [17]

Answer:

The answer is Wardriving

Explanation:

The act of driving around an area while running a laptop configured to detect and capture wireless data transmissions is Wardriving.

Wardriving is the act of searching for Wi-Fi wireless networks by a person usually in a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet.

Warbiking, warcycling, warwalking and similar use the same approach but with other modes of transportation.

Wardrivers use a Wifi-equipped device together with a GPS device to record the location of wireless networks. The results can then be uploaded to websites like WiGLE, openBmap or Geomena where the data is processed to form maps of the network neighborhood. There are also clients available for smartphones running Android that can upload data directly.

8 0
4 years ago
What are the two common architectures used to process data
vitfil [10]
The two most common architectures used (by CPUs as I am assuming your question means) are x86 (32-bit) and x64 (64-bit).
32-bit processes multiple instructions with a single request while 64-bit adds registers for instructions that use 64-bit address space.
8 0
3 years ago
Other questions:
  • Which of the following is a preferable method to secure wireless access in a SOHO?
    6·1 answer
  • Assume you had a .csv file with data already populated that you wanted to use for a mail merge. Which button would you press to
    8·1 answer
  • Technician A says that almost every part of a vehicle is somehow powered by or controlled by an electrical or electronic system.
    9·2 answers
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • What data unit is addressed based on the IP address of the recipient?
    8·1 answer
  • What do workspaces allow a company to do?
    9·1 answer
  • What is hardware?
    10·1 answer
  • In the RSA system, the receiver does as follows:1. Randomly select two large prime numbers p and q, which always must bekept sec
    6·1 answer
  • It is an electronic device that capable of accessing accepting processing product and storing data​
    13·1 answer
  • I want to make a game with a friend. I use visual studio code. How do I work on the game with him? Like can he edit the same tim
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!