1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
2 years ago
8

Unauthorized use of computer system with a view to seeing or changing data is refered to as

Computers and Technology
1 answer:
Semmy [17]2 years ago
3 0

Answer:

I believe hacking I don't know for sure you may want to see what someone else says

Explanation:

You might be interested in
In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
ra1l [238]
B I think is the best answer
7 0
3 years ago
Read 2 more answers
Select all the correct answers.
oksano4ka [1.4K]

Explanation: 2 and 5

3 0
3 years ago
Read 2 more answers
List the types of infrared we have
Vlad [161]

Answer: infared types like the sun, sun light, heat lamps, and radiators

6 0
3 years ago
What does www stand for?
Temka [501]
Www stands for world wide web
3 0
3 years ago
Read 2 more answers
The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
dybincka [34]
I don't think some will write the whole program here, but which part are you having trouble with?
6 0
3 years ago
Other questions:
  • Assume you have a sorting algorithm that you can use as a black box. Use the sorting algorithm to sort the input list. Now write
    10·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit, and will provide methods to get and display the temperatur
    5·1 answer
  • How does a router differ from such devices as repeaters, bridges, and switches?
    6·1 answer
  • Drag each tile to the correct box.
    11·1 answer
  • Categorize each of the following situations as a compile-time error, run-time error, or logical error. Group of answer choices m
    5·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • The disk you inserted was not readable by this computer
    11·1 answer
  • Which unit of binary storage has a size that is processor dependent?.
    15·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
  • consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!