1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
5

Individuals who break into computer systems with the intention of doing damage are called​ _____________.

Computers and Technology
1 answer:
notka56 [123]3 years ago
7 0
I think the answer is hackers
You might be interested in
________ was the communication medium of choice for early computer criminals.
vladimir1956 [14]
I would say that morse code would be the answer, but im not sure if that would apply to  computers
5 0
4 years ago
What happens to the files and folders on the desktop when the computer is turn off
andriy [413]

Answer:

All of the files are stored on a hard-drive. Except for the files you just viewed before turning off the computer, which is stored in the RAM (Random Access Memory). If your computer is a desktop, and the power goes out while looking at a photo/pdf, you may corrupt/lose the image if the computer didn't have enough time to store it in the hard drive. Everything in the hard drive is 'scratched' into it like a record. If you delete a file, that part of the disk is 'smoothed' as best as it can. If you upload another file, you might corrupt/ruin the image/pdf. Think of the smoothing like recording a football game over an old VHS of Winne the Pooh. If you have any other questions, please ask by commenting on this answer!

4 0
3 years ago
A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another web
ra1l [238]

Answer:

Option A. Third-party cookies

Explanation:

When you are browsing a website, this can store small pieces of useful data, based on your activity during your visit. This information is being collected by the website you are looking at, and you can see its domain on your address bar. Unlike regular cookies (or First-party cookies).

A third-party cookie belongs to a different domain than the one on your address bar. This is widely used in internet ads to show a person ads that will most likely interest him/her, according to where he/she is clicking. If you click on an internet ad, you will send information to the ad's domain, a cookie will be stored, stating that you are interested in this kind of ad. The advertiser can use these cookies to improve his advertising campaign or create more effective ads.

6 0
4 years ago
Whats the lore in night in the woods?
Murljashka [212]

Answer:

NIGHT IN THE WOODS is about an anthropomorphized cat named Mae, a college dropout who returns to her hometown of Possum Springs to reconnect with her family and friends

Explanation:

6 0
2 years ago
Read 2 more answers
What is the correct order of precedence of the mathematical operators?
LenaWriter [7]
A common technique for remembering the order<span> of </span>operations<span> is the abbreviation "PEMDAS", which is turned into the phrase "Please Excuse My Dear Aunt Sally". It stands for "Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction".</span>
7 0
4 years ago
Other questions:
  • Hands-on Assignment To these assignments, refer to the tables in the JustLee Books database. Generate and test two SQL queries f
    10·1 answer
  • Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
    6·1 answer
  • how do I comment on answers? there's one answer I'm confused about but I don't know how to comment on it
    7·2 answers
  • Regularly Tuning up a computer can assist keeping it running at Peak speed. True or False?
    12·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • A ________ is a dummy function that is called instead of the actual function it represents, to test that the call to and return
    8·1 answer
  • In this lab, you declare and initialize variables in a Java program. The program file named NewAge.java, calculates your age in
    14·1 answer
  • Data from RAM may be placed where to free up space?
    7·1 answer
  • In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension sho
    10·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!