1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
11

Define types of hacker ? with three to four line of each types?​

Computers and Technology
1 answer:
Strike441 [17]3 years ago
5 0
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
You might be interested in
HELP PLZ WILL MARK BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!! :)
Ilya [14]

Answer:

light

Explanation:

6 0
3 years ago
Read 2 more answers
How does a Cloud-first strategy approach a client's migration to the Cloud?by removing outside ecosystem partners from the Cloud
belka [17]

Cloud-first strategies are <em>operating methods</em> wherein teams move all or most of their infrastructure to <em>cloud computing systems</em><em>  </em>such as Web Services, and the further discussion can be defined as follows:

  • It stores assets, including quest and <em>secure resources</em>, in the cloud rather than employing <em>physical resources</em> including such server clusters.
  • This approaches a client's migration to the <em>Cloud by integrating multiple services </em>together to serve the client's business needs.

Therefore, the final answer is "Last choice".

Learn more:

brainly.com/question/1256812

3 0
3 years ago
The most direct way for Jonothan to gain on-the-jib experience and earn money while attending school is to apply for
Sholpan [36]
A part-time job would provide on-the-job experience while also giving him a flexible schedule competing with school.
4 0
4 years ago
Scott does not use privacy settings on his social media
likoan [24]

Answer:

ARREST HIM!!!

Explanation:

7 0
3 years ago
Read 2 more answers
When an online company runs a special promotion on swimsuits during the summer, they are taking advantage of the concept of
LenaWriter [7]
<span>When an online company runs a special promotion on swimsuits during the summer, they are taking advantage of the concept of p</span>eople’s urge to go for swimming to beat the summer heat and keep themselves cool. As a result, they are very likely to buy more swimsuits to go swimming. 
With a special promotion on swimsuits, people are likely to buy the company’s merchandise. This is because they can get what they want by paying a lesser amount than usual. In turn, the company is able to benefit by making more sales than its online and retail competitors.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Describe the components of series-parallel circuit
    14·1 answer
  • Two columns of a relational table can have the same names. <br> a. True <br> b. False
    15·1 answer
  • Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment
    8·1 answer
  • Declare a structure whose tag name is Server and that contains the following fields: manufacturer, a string, model and serialnum
    12·1 answer
  • Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
    5·1 answer
  • Write a Java program that generates GUI (Graphical User Interface). Your program should provide labels and textfields to a user
    9·1 answer
  • What is considered to be the core of the Unix operating system ?
    14·1 answer
  • Your company has purchased another company that also uses Windows Server 2016 and Active Directory. Both companies need to be ab
    11·1 answer
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • Lisa is developing a Web application using a framework and wants to include interactive elements using JavaScript. She decides t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!