1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
5

Write examples of hacking in internet?​

Computers and Technology
2 answers:
SCORPION-xisa [38]3 years ago
7 0

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Advocard [28]3 years ago
5 0

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

You might be interested in
Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
SpyIntel [72]

I think she's using Excel.

6 0
4 years ago
What is the definition of Simplex transmission and Duplex Transmission?
ira [324]

Answer:

Alternatively referred to as simplex communication or simplex transmission, simplex is a one-way only communication standard that broadcasted information may only travel in one direction. This method is different than duplex transmission, which allows for two-way broadcasting. Examples of simplex include radio broadcasting, television broadcasting, computer to printer communication, and keyboard to computer connections.

Explanation:

computers

6 0
4 years ago
¿Cuánta energía consumirá una lavadora de 1200W de potencia, si se deja conectada durante 20 horas? ¿Cuánto deberemos pagar si e
9966 [12]

Answer:

The amount to be paid is €2.88 for the amount of power consumed

Explanation:

The first thing to do here is to convert the power consumption to kilo-watt

1 kilowatt = 1000 watt

x kilowatt = 1200 watt

x = 1200/1000 = 1.2 KW

we now convert this to kilowatt hour by multiplying the number of hours by the number of kilowatt.

That would be 20 * 1.2 = 24 KWh

Now, the charge is 0.12€/kWh

for 24 kWh, we have 24 * 0.12 = €2.88

6 0
3 years ago
Which of these purchases is most likely to be paid for with a credit card
Vesna [10]

Answer:

plane ticket?

Explanation:

7 0
3 years ago
A motor controller controls the and of the motors.
o-na [289]

Answer:

yes. and?

Explanation:

is that all?

4 0
3 years ago
Other questions:
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • When you select Insert and click on a shape the mouse pointer turns into a/an
    12·2 answers
  • A computer can sort x objects in t seconds, as modeled by the function below:
    5·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·2 answers
  • Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The perf
    15·1 answer
  • Excel allows you to rotate text in a cell counterclockwise by entering a number between -1 degrees and -90 degrees. True or fals
    14·1 answer
  • Which of the following is false? Group of answer choices A) A string may include letters, digits, and various special characters
    7·1 answer
  • Windows OS and Mac OS are examples of which type of operating systems?
    5·1 answer
  • Please help me!!!!!!!!
    5·2 answers
  • Write a program that prompts the user to input an integer and then outputs both the individual digits of the number and the sum
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!