1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
2 years ago
11

Define types of hacker ? with three to four line of each types?​

Computers and Technology
1 answer:
Strike441 [17]2 years ago
5 0
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
You might be interested in
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
What happen if ignore the unsafe markings in hand tools in ict​
Snowcat [4.5K]

Answer:

Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.

4 0
2 years ago
What is sexual intercourse <br><br>​
n200080 [17]

Answer:

immmm ....

I know the answer but I won't tell..lolllll

7 0
3 years ago
Read 2 more answers
When activated, an Excel object has all the features of an Excel
Rainbow [258]
D. Workbook
Hope this helps
7 0
3 years ago
Read 2 more answers
1. Felipe looks over his presentation, and he notices that some of his words are written in bold and some are written in italic.
romanna [79]
 <span>Felipe looks over his presentation, and he notices that some of his words are written in bold and some are written in italic.</span>His ability to remember these differences is an example of Retroactive encoding. Even though you didn't share the options, I am pretty sure this one will help!

4 0
3 years ago
Other questions:
  • Which software application should be used to create a sales pitch to a group of people? Database Email Presentation Word process
    9·1 answer
  • Lux Ladies, Inc., is a company that specializes in expensive and unusual gifts for all occasions. It keeps a large file of infor
    11·1 answer
  • Which button, when pressed, allows light from the subject to fall on the sensor?
    8·1 answer
  • Consider the following sequence of page references: 1 2 3 3 4 4 1 4 1 3 4. Determine how many page faults will occur with LRU(Le
    13·1 answer
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • Explain the working system of computer systems with examples​
    14·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    9·1 answer
  • Choose the missing term.
    14·1 answer
  • If your computer determines the destination address of a network packet is to a remote network.
    9·1 answer
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!