1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
5

Which of these is true of blackhat and whitehat hackers?

Computers and Technology
2 answers:
earnstyle [38]3 years ago
5 0

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

Alekssandra [29.7K]3 years ago
5 0

Answer:

c is the answer i hope help you

You might be interested in
Outlines help you visualize the slides and the points you will include on each slide.
kvv77 [185]
I don’t know I think true
6 0
3 years ago
Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for wr
Zina [86]

Answer:

First two statements: yes. Last two: not so much.

But many of the better ones do have advanced degrees, but some don't.

The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.

4 0
3 years ago
Read 2 more answers
⦁ when creating a strong password, what are some valid criteria the password should meet?
AURORKA [14]
Your password should never contain personal information that somebody can guess. The most secure passwords contain; uppercase letters, lowercase letters, numbers, and symbols in some sort of variation.
A lot of times using numbers in place of letters like using a 5 in place an S, a 3 in place of an E, a 0 in place of an O, or a 1 in place of an L or I, will increase the strength of a password.
A good example could be using "Cha1rL3g$"

Hope this helped or was helpful information!
6 0
3 years ago
Read 2 more answers
This sensor is used for burglar alarms<br>A. temperature<br>b. humidity<br>c. movement<br>d. PH​
bogdanovich [222]

Answer:

C

Explanation:

Have a great summer :)

8 0
3 years ago
The term “frivolous” implies that the author
tiny-mole [99]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
believes that the average individual does not need a smart phone 
<span>firivolous mean not serious, light, unimportant.</span>

3 0
4 years ago
Other questions:
  • Search engines rank Web pages based on which of the following?
    6·1 answer
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • Based upon what you know
    5·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • Who tryna play among us
    8·2 answers
  • 8.5 Edhesive Code Practice
    14·1 answer
  • Which wireless specification can connect to a school's WLAN and connect to multimedia display projectors wirelessly?
    7·1 answer
  • What is virtual memory? What is the function of associative memory?
    14·1 answer
  • A cell's address, its position in the workbook, is referred to as a ________________ when it is used in a formula.
    15·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!