1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
15

On tool hackers use to get sensitive information from victims is/are:

Computers and Technology
2 answers:
Elena L [17]3 years ago
8 0
Absolutely c is the correct!
Feliz [49]3 years ago
5 0
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
You might be interested in
If you have questions about taxes, where can you go to get answers?
Andrews [41]

Answer:

Explanation:

i was told to paste this to other comment sections sooo...HEY PLS DON'T JOIN THE ZOOM CALL OF A PERSON WHO'S ID IS 825 338 1513 (I'M NOT SAYING THE PASSWORD) HE IS A CHILD PREDATOR AND A PERV. HE HAS LOTS OF ACCOUNTS ON BRAINLY BUT HIS ZOOM NAME IS MYSTERIOUS MEN.. HE ASKS FOR GIRLS TO SHOW THEIR BODIES AND -------- PLEASE REPORT HIM IF YOU SEE A QUESTION LIKE THAT. WE NEED TO TAKE HIM DOWN!!! PLS COPY AND PASTE THIS TO OTHER COMMENT SECTIONS

4 0
3 years ago
A computer can manipulate symbols as if it understands the symbols and is reasoning with them, but in fact it is just following
Law Incorporation [45]

Answer:

The symbols may or may not have meaning, but the machine does not need to know how the symbols are interpreted in order to manipulate the symbols in the right way.

Explanation:

The computer can change the symbols in the case when the computer understand but in actual following the cut-paste rules without having any understanding this is because the symbols might be have meaning or not but if we talk about the machine so actually they dont know how the symbols are interpreted and how it can be used so that it can be change in the accurate way

5 0
3 years ago
Which can be used to plan a program?
Marina86 [1]

Answer:

Pseudocode.

Hope this helps you...

Explanation:

8 0
3 years ago
Read 2 more answers
What do you think is the most important event in the history of the Internet? What event has had the biggest impact on your dail
lana [24]

Answer:the answer would be this serious when anonimous came to the world or rather when anonymity came

 

Explanation:

The most important events of all the Internet was when anonomous arrived and began to reveal secrets and things against the United States government

 

3 0
3 years ago
What is a method? an object instantiated from a class a coordinated sequence of instructions that will be carried out when reque
yKpoI14uk [10]

Complete Question:

What is a method?

A. An object instantiated from a class

B. An elegant and efficient way of programming

C. A coordinated sequence of instructions that will be carried out when requested

D. Using Alice control structures such as a a "Loop" to shorten code

Answer:

C. A coordinated sequence of instructions that will be carried out when requested

Explanation:

A method also known as function or procedure in other languages is a written set of code with a name and parameter list that can be requested/ called/invoked by typing out its name to carryout its function. A method can be seen as a  subprogram which carries out some action on data and most times gives back (returns) a value.

7 0
3 years ago
Other questions:
  • Design and write an object-oriented program for managing inventory bins in a warehouse. To do this you will use two classes: Inv
    5·1 answer
  • Ryan wants to ensure that all the words in this document are evenly spaced so that they look neat and readable . Which option in
    12·1 answer
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • Which of the following choices is not a viewing option?
    10·1 answer
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • Settings to control the amount of notifications is a
    10·2 answers
  • All websites with medical information should be considered credible.
    15·2 answers
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!