1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
13

Define types of hacker ?plz help me with this question​

Computers and Technology
2 answers:
denis-greek [22]3 years ago
8 0

Answer:

the types of hacker attacks and techniques. White Hat Hackers. Black Hat Hackers. Gray Hat Hackers. Script Kiddies.

Explanation:

i don't know if this can help you

Volgvan3 years ago
8 0

Answer:

White Hat Hackers

Black Hat Hackers

Gray Hat Hackers

Script Kiddies

Green Hat Hackers

Blue Hat Hackers

Red Hat Hackers

State/Nation Sponsored Hackers

Hacktivist

Malicious insider or Whistleblower

You might be interested in
Big Data often involves a form of distributed storage and processing using Hadoop and MapReduce.
olya-2409 [2.1K]

One reason for this is:  the processing power needed for the centralized model would overload a single computer.

<u>Explanation:</u>

Companies would be engrossed in achieving and examining the datasets because they can supplement significant value to the desicion making method. Such processing may include complicated workloads. Furthermore the difficulty is not simply to save and maintain the massive data, but also to investigate and extract a essential utilities from it.

Processing of Bigdata can consists of various operations depending on usage like culling, classification, indexing, highlighting, searching etc. MapReduce is a programming model used to process large dataset workloads. Hadoop is designed to scale up from single servers to thousands of machines, each offering local computation and storage.

5 0
3 years ago
Want to.learn about computers​
MAVERICK [17]
Yes...I do want to learn about computer
6 0
3 years ago
An application programming interface (API) is ________. A) the code the application software uses to take advantage of code writ
Lapatulllka [165]

Answer:

A) the code the application software uses to take advantage of code written by others

Explanation:

An API is a tool widely used in the development of moderm software applications, it is basically a set of protocols and routines that specifies how the software application should interact with others. It provides the interface of the communucation link for the different parts of the program. The intent of APIs is for the simplification of software development and maintenance.

7 0
3 years ago
What is the name of the symbol that is used to classify and categorize information?​
igomit [66]

Answer:

A Hashtag

Explanation:

3 0
3 years ago
Read 2 more answers
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is computer virus?
    8·1 answer
  • Twitter is an example of a __________. social bookmarking website social tagging website microblogging website blogging website
    12·1 answer
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • Which are considered regulatory agencies? Check all that apply. WHO PPO HMO CMS CDC NIOSH
    11·2 answers
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    11·1 answer
  • What is wrong with line 1?
    14·1 answer
  • Which of the following statements about electronic cover letters is true?
    14·2 answers
  • The physical parts of the computer are known as?
    14·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • Write the name of main ore of silver.Write any two application of sliver​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!