1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
14

What is the difference between hacking and cracking

Computers and Technology
1 answer:
liq [111]3 years ago
3 0

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

You might be interested in
A triangular number is a number that is the sum of the integers from 1 to some integer n. Thus 1 is a triangular number because
neonofarm [45]

Answer:

  1. m = 3
  2. n = 20
  3. triList = []
  4. current = 0
  5. for i in range(1, n + 1):
  6.    current = current + i  
  7.    if(current >= m and current <= n):
  8.        triList.append(current)
  9. print(triList)

Explanation:

The solution code is written in Python 3.

Firstly, create variable m and n and set the value 3 and 20 to the variables (Line 1 -2)

Create a triangle number list (Line 4)  and another variable current to hold the value of current total of triangle number (Line 5).

Create a for loop and iterate through the number between m and n (Line 6).  Calculate the current total of triangle number (Line 7) and proceed to check if the current triangle number is bigger or equal to m and smaller and equal to n, add the current triangle number to triList (Line 8-9).

Print the triList (Line 11) and we shall get [3, 6, 10, 15]

4 0
3 years ago
Nora has shared a document with others, and she needs to be able to easily identify when others are modifying the
Lilit [14]

Answer:

What is the purpose of the wordart text effect called Transform?

What is the purpose of the WordArt text effect called Transform? It adjusts the shape of the text. Why is it helpful to combine documents when there are multiple reviewers? This allows users to view color-coded changes from several reviewers in one document.

Explanation:

8 0
3 years ago
System testing: A. includes all the preparations for the series of tests to be performed on the system. B. tests the functioning
hichkok12 [17]

Answer:

B. tests the functioning of the system as a whole.

Explanation:

System testing is an integral part of system development.

Testing is all about ascertaining the functionality of the system to meet the initial functionality designed before.

From the options, the best answer that suite the definition of system testing is:

B. tests the functioning of the system as a whole.

System testing test the functioning of the system as a whole. It check the functionality of individual part and how it relate or inter-operate with other part in the entire system.

4 0
3 years ago
Show how the value 0xabcdef12 would be arranged in memory of a little-endian and a big-endian machine. Assume the data is stored
viva [34]

Answer and Explanation:

For the Big Endian

In a big endian format, the most significant byte is stored at the lowest address and the least significant byte is stored at the highest address. Therefore, the data given is stored as follows:

Address 0 | 1 | 2 | 3

Byte ab | cd | ef | 12

For the Little Endian

In a little endian format, the most significant byte is stored at the highest address (so the least significant byte is stored at the lowest address).

So, the data given would be stored as follows:

Address 0 | 1 | 2 |3

Byte 12 | ef | cd | ab

Hope this Helps!!!

5 0
3 years ago
Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
ale4655 [162]

Answer:

Because of the newly developed biometric technology, the FBI was able to

quickly identify two suspects.

The blurry photos released by the FBI after the bombing prompted

researchers to improve their early biometric software.

Because biometric technology was unavailable at the time, the Boston

Marathon bomber remains at large.

The Boston Marathon bombing made researchers aware of how biometric

technology is sometimes useless and ineffective.

Explanation:

6 0
3 years ago
Other questions:
  • What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
    12·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • Billy needs to type a bibliography/reference page for the report that he just typed. Which paragraph format should he use?
    8·1 answer
  • Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
    6·1 answer
  • Can someone explain a cylinder
    7·1 answer
  • Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given th
    15·1 answer
  • Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
    15·1 answer
  • Which of the following are examples of typical problems an ISS professional would encounter? Check all
    5·2 answers
  • Which topology connects multiple star-topology networks using a bus topology?
    6·1 answer
  • Pick the correct statements on the 64-bit machine representation of numbers.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!