1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
8

Why hackers hack?? in other people?​

Computers and Technology
2 answers:
pshichka [43]3 years ago
8 0
Could you please reword this question. i don’t get what you’re asking
Alchen [17]3 years ago
8 0

Answer:

Well, some people are paid, or asked to do so, some are told to by the government, and some do it as a form of protest. White Hat hackers hack people for good purposes, like stopping nuclear bombs and stuff like that, while black hat hackers hack for bad purposes like setting off nuclear bombs and stealing info from other people, and not in a good way.

Explanation:

You might be interested in
Where could cloud computing fit in the organizational structure and operations?
vampirchik [111]

Answer:

Computing cloud could fit in the website under the IT directory, with total access to all employees and shareholders.

Explanation:

8 0
3 years ago
Create a new collection class named SortedLinkedCollection that implementsa collection using a sorted linked list. Include a toS
Irina18 [472]

Answer:

Since you have not mentioned the way toString method was implemented in your class, I am just providing a sample implementation of it.

Please find the code in file attached.

Explanation:

Please see attached file.

Download txt
5 0
3 years ago
How does pharming work?
Aleksandr-060686 [28]

Answer:

Pharming, on the other hand, is a two-step process. One, cybercriminals install malicious code on your computer or server. Two, the code sends you to a bogus website, where you may be tricked in providing personal information. Computer pharming doesn’t require that initial click to take you to a fraudulent website.

Explanation:

4 0
4 years ago
Arlo wants to use goal seek to answer "what if" questions in a file. To do this, he clicks the cell in the spreadsheet that he w
natka813 [3]

Answer:

What-if Analysis

Explanation:

What-if Analysis is the process of changing variables and observe if the changes will affect or alter the final result.

It's tools includes, one and two variable data tables, goal seek, scenario manager, solver add-in.

7 0
3 years ago
Subnetting operates at layer ___ while vlans function at layer ___.
Veseljchak [2.6K]
Subnetting operates at layer VLAN data link layer 2, while vlans function at layer subnetting LAYER 3.
5 0
3 years ago
Other questions:
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
    7·1 answer
  • This graph shows both a reflection and a
    14·2 answers
  • 2. What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
    6·2 answers
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
    11·1 answer
  • How many dlcs in total were in each black ops game (including dlc weapons) answer for 25 whole points
    8·1 answer
  • Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.
    5·1 answer
  • Providing captions and transcripts for videos on your website is a way of ensuring what?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!