1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
2 years ago
11

Define types of hacker ? with three to four line of each types?​

Computers and Technology
1 answer:
Strike441 [17]2 years ago
5 0
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
You might be interested in
The last 64 bits of an ipv6 address are the interface identifier. what is frequently used to specify the interface identifier?
Sliva [168]
Answer: the MAC (Media Access Control) address
6 0
3 years ago
Texture fills are available to add as a slide background true or false
IrinaK [193]
I belive its true but i am not a 100% sure
6 0
3 years ago
Read 2 more answers
A communication medium which allows receivers to observe multiple cues, such as body language and tone of voice, and allows send
castortr0y [4]

Answer: Rich medium

Explanation: A communication is said to be rich id it provides the services like observing the body language, immediate communication, instant judging of the voice tone etc. These factors are commonly found in the face to face interaction which is considered as the rich source of communication. It is considered as rich medium because  it has the capability of receiving the output immediately .

4 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
A(n) _____ is a simple database program whose records have no relationship to one another.
almond37 [142]
"flat file"

A simple database program whose records have no relationship to one another<span>single</span>
7 0
3 years ago
Other questions:
  • Which is a function of network media?
    14·2 answers
  • How might writing an online journal be different than writing in a paper one ​
    15·2 answers
  • When is Hytale coming out?<br><br><br> P.S it might be Mine-craft 2.0<br><br><br> :)
    7·1 answer
  • 9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
    5·1 answer
  • AWT
    7·1 answer
  • ___________ is related to mass, but also includes the gravitational pull of the Earth.
    14·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • Does anyone know what i did wrong?
    13·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
  • Write the name of main ore of silver.Write any two application of sliver​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!