1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
15

On tool hackers use to get sensitive information from victims is/are:

Computers and Technology
2 answers:
Elena L [17]3 years ago
8 0
Absolutely c is the correct!
Feliz [49]3 years ago
5 0
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
You might be interested in
he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
Dennis_Churaev [7]

Answer:

remastering iso image

Explanation:

you  can add the gui, default installed program, etc

3 0
3 years ago
Describe email etiquette and netiquette when communicating electronically.
navik [9.2K]

Answer:

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates

Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.

6 0
3 years ago
In what way are a coffee maker and a dishwasher the same?<br><br>BY THE WAY THIS IS TEENBIZ
weeeeeb [17]
They both need electricity. Both used in the kitchen.
3 0
3 years ago
Read 2 more answers
What is usually written in block style with the body text along the left margin.
Effectus [21]
A Business letter

6ix9ine
4 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Other questions:
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • Transcoding digital videos does not cause a loss of quality. <br> a. True <br> b. False
    9·1 answer
  • 1. How do channels differ from layers?
    11·1 answer
  • 1. Actuators apply mechanical force in the form of pressure to overcome
    10·1 answer
  • Which of the following is true about ISO___________.
    5·1 answer
  • For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a space.
    6·1 answer
  • What is the main type of energy used to help convert metamorphic rocks into igneous rocks in the rock cycle ?
    10·1 answer
  • Imagine a system with 64MB of physical memory. Suppose the OS and its data structures occupy 16MB and there are two processes, o
    12·1 answer
  • What is the cheapest way to add more USB ports to your computer?
    14·1 answer
  • Why does a bus topology require a terminator? a) because otherwise it would be a ring network b) because otherwise the packets w
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!