Answer:
Damage and chaos. ...
An ego stroke. ...
Monetary or information gain. ...
Stealth. ...
Prevention.
To take control of a computer and use it for specific tasks.
To generate money.
To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
To cripple a computer or network.
Explanation:
A. (pie chart) - correct answer
Answer:
Err. I'm getting vibes from C.
Explanation:
Janelle is organizing an outline for an investigative report about the benefits of taking a 30-minute walk each day.
Benefits - Good/Helpful
Arch bridges have a semicirclar, curved support.