1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
8

Unauthorized use of computer system with a view to seeing or changing data is refered to as

Computers and Technology
1 answer:
Semmy [17]3 years ago
3 0

Answer:

I believe hacking I don't know for sure you may want to see what someone else says

Explanation:

You might be interested in
The Campus Housing Service helps students find apartments. Owners of apartments fill in information forms about the rental units
Alexxx [7]

Answer:

Check the explanation

Explanation:

LI system and software engineering concepts, the use cases are widely used Use case is a collection of eve. or actions steps, it mainly defining the interactions between a system and a role for achieving a specific goal.

Here the actor can he external system or a human being:

For identifying the use case, the below steps needs to he followed

• Identify the actors involved in the system.

  • In our task the actors are the student and the owners  

• Identify the actor's goals

  • Goals are the activities performed

• Identify the use case candidates

The persons who are all actively involved in the use case

• Identify the use case starting points

• Identifying the use case ending points

• rind the scope and the unit of interactions in the use case  

Identifying the steps in Housing system:

• Several implementation steps are provided in the task that needs to he identified in this particular stage

• The housing system is helping the stuck,. for finding the con. apartments which is meeting their requirements

Check the below diagram.

6 0
4 years ago
ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!
Delicious77 [7]

Answer:

The following are the steps to change the profile name.

Explanation:

In the given question it is not defined in which we change the profile name.so, we define the steps to change the profile name social media like (Face book).

  • first of all, login into your account with your id and password.
  • After login go to the setting bar, this bar is available on the top right corner.    
  • After opening the setting go to the general setting option and open it.
  • In the general setting option, It provides name, username, and contact options in these options we update the profile name.  
  • To update the profile name we click on the edit link in which it opens the edit panel. After writing the name select the save changes button to save the profile name.
4 0
4 years ago
Vector graphic is usually required more storage space than bit maps true or false
barxatty [35]
The answer is false
5 0
3 years ago
Bill's manager has asked him to send all staff members the directions for checking out the new projector. In 1–2 sentences, desc
Alex787 [66]

He should send an email to all of his colleagues to inform them of all of the directions. Emails are an easy and fast route to letting people know what's up.

- Mabel <3

6 0
3 years ago
Read 2 more answers
A drawback of using observation as a data collection method is that:_______
melamori03 [73]

Answer:

The answer is d, because it is not reliable in the sense that it can be used for important and sensitive information when your collecting data.

8 0
4 years ago
Other questions:
  • While ________ is centered on creating procedures, ________ is centered on creating objects. Procedural programming, class progr
    10·1 answer
  • This isn't school wise but like.. I can't log into IMessage so I decided to try and log into FaceTime but thats not working. Cau
    7·1 answer
  • What is good prossesser
    15·2 answers
  • Describe how pseudocode makes programming more efficient for large programming tasks.
    10·2 answers
  • In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
    15·1 answer
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
    10·1 answer
  • Which of these did the author use to create certain moods?
    6·1 answer
  • What makes a source credible?
    9·2 answers
  • Which computer are used by mobile employees such as meter readers.​
    6·2 answers
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!