1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
13

Josh is learning about hackers know for finding loopholes in systems, without notifying the company or organization beforehand.

Which type of hacker is he learning about ?
Computers and Technology
1 answer:
tankabanditka [31]3 years ago
3 0

Answer:

Grey Hat Hacker

Explanation:

Mainly there are 3 types of hackers:

1: Black Hat Hacker: Hackers who enter in our device without permission and steal our important files and blackmail us or put virus in our device without permission. Black Hat hackers are criminals.

2: Grey Hat Hacker: Hackers who enter in our device without permission but, for checking that our device is safe or not and tell us about virus(if there). They did not harm our device or put virus or take our important documents. They are not criminals

3: White Hat hacker: Hackers who enter in our device with our permission only, and tell us about virus that there is any virus in our device or not and also tell us that our device is safe or not. They are also not criminals.

You might be interested in
What ip class is this address: 128-191.255.255.255?
defon
Class B would be the correct answer.
4 0
4 years ago
Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010
icang [17]

Answer:

The receiver will not detect the error.

Explanation:

The byte sent by transmitter: 10101010

The byte received by receiver due to channel noise: 10011010

If you see the bold part of the both sent and received bytes you can see that the number of bits changed is 2.

The two communicating devices are using a single-bit even parity check. Here there are two changed bits so this error will not be detected as this single bit even parity check scheme has a limit and it detects the error when the value of changed bit is odd but here it is even.

This parity scheme basically works well with the odd number of bit errors.

7 0
4 years ago
If an internet document identifies its author but says nothing about her or his qualifications, your textbook recommends that yo
PSYCHO15rus [73]

If the internet document identifies the author, the textbook recommends that you type the author's name into the internet search box.

<h3>What is an internet document?</h3>

These are those documents that are gotten from the a search on the internet. To cite such items there are certain guidelines that are to be followed.

A simple search on a search engine would show you the most important details that this author possesses.

Read more on internet documents here:

brainly.com/question/14715750

5 0
3 years ago
If you like to play graphic-intensive games on your computer and you find that your computer can't keep up, you should add a ___
s344n2d4d5 [400]
I think its video card tell me if i'm wrong
6 0
4 years ago
Ian’s photography teacher asks him to take some photos of a few different species over the weekend. Which group of photos would
alina1380 [7]
I think it’s b or d..............
5 0
3 years ago
Other questions:
  • Most browsers allow you to maintain your most frequently visited websites. what is this called? Special place holder, secret lis
    6·2 answers
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    9·2 answers
  • The physical parts of the computer that you can see and touch are called______.
    5·1 answer
  • What are the side effects of overclocking?
    13·1 answer
  • I have been working on this python program for a hour now, and I am trying to figure out what I an doing wrong in the loop. I ha
    5·1 answer
  • Please help!! I need this asap! thank you so much!! &lt;3
    6·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • What is the name of the variable in this code?
    13·2 answers
  • True or false, USBs are slower than RAM.
    15·1 answer
  • Use the function varimp() on the output of train() and save it to an object called imp:_____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!