1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
2 years ago
9

Find true or false. A hacker is hacking software with access in sensitive information from your computer​

Computers and Technology
1 answer:
Alina [70]2 years ago
7 0
ITS TRUE!!I SEARCHED IT
You might be interested in
Como hago para poner brainly en español???
Lelu [443]
Mentely es eso espero q te ayude :)
4 0
3 years ago
Read 2 more answers
What is the name of the FOLDER in which the file named "script" is contained?
yulyashka [42]

Answer:

The default location for local logon scripts is

  • the Systemroot\System32\Repl\Imports\Scripts folder

5 0
3 years ago
Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? Group of a
VladimirAG [237]

Answer:

168.16.1.1 is correct.

Explanation:

168.16.1.1 is the legitimate Internet Protocol address that can be used on the Internet.

Internet Protocol 10.10.1.1 and internet Protocol 172.30.1.1 are the private internet protocol addresses so they could not be used on the internet.

The Internet Protocol 234.1.1.1 has been used as a multicast address so they may not be used on the Internet.

7 0
3 years ago
Who wants to join my team that goes against bullying?
weeeeeb [17]
I would be glad to. :D
6 0
3 years ago
(iii) If 1 GB = 2x<br>then what is the<br>value of x?​
frez [133]
Since a Gigabyte is made of Megabytes, 500 Megabytes times 2, 2(500MB), is equal to one Gigabyte. (1000MB)
UNLESS, it wants the Windows way of storage, because one Gigabyte in Windows terms is actually 1024 megabytes... then it’d be 2(512MB) because 512MB and 512MB equals one windows storage gigabyte.
4 0
3 years ago
Other questions:
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • What method of the Math object can be used to return the largest value from the values that are passed to it?
    14·1 answer
  • Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100
    10·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • Suppose that you have the following declaration:
    7·1 answer
  • What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon
    6·2 answers
  • Create a set of functions that compute the mean, median, and mode of a set of
    8·2 answers
  • What is the meaning of FTTH
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!