1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
13

Josh is learning about hackers know for finding loopholes in systems, without notifying the company or organization beforehand.

Which type of hacker is he learning about ?
Computers and Technology
1 answer:
tankabanditka [31]3 years ago
3 0

Answer:

Grey Hat Hacker

Explanation:

Mainly there are 3 types of hackers:

1: Black Hat Hacker: Hackers who enter in our device without permission and steal our important files and blackmail us or put virus in our device without permission. Black Hat hackers are criminals.

2: Grey Hat Hacker: Hackers who enter in our device without permission but, for checking that our device is safe or not and tell us about virus(if there). They did not harm our device or put virus or take our important documents. They are not criminals

3: White Hat hacker: Hackers who enter in our device with our permission only, and tell us about virus that there is any virus in our device or not and also tell us that our device is safe or not. They are also not criminals.

You might be interested in
What is ambient sound, and what is its purpose in film? When can it be a drawback ?
Helen [10]

Answer:

Ambient sound is an environmental sound or surrounding sounds. They use this kind of sound to give a film's scene credence(belief in or acceptance of something as true). When the sound starts to become distracting to the audience the drawback is used.

Explanation:

6 0
3 years ago
1. What arguments can you make for the idea of a single language for all programming domains
SVEN [57.7K]

Answer:

The answer to this question defined below.

Explanation:

It's a smart idea to get a common language for coding of every kind. It would help all developers and customers understand the language better because, in every case, there's no more need to learn, that language.  

  • This could also render software developed in the very same language consistent, and therefore, ports on multiple platforms are not required.
  • In this process, we talk about the common property and function of the classes, that's why it is the correct answer.
3 0
3 years ago
What will happen to the number of returns you get if you use the NOT Boolean operator in a search?
posledela
Smaller, as it removes search results.
7 0
4 years ago
Dov'è il mio formaggio
fredd [130]

Answer:

non lo so, mi spiace

Explanation:

6 0
3 years ago
Read 2 more answers
Hyperlinks are a part of an HTML element called a(n) _____.
Lyrx [107]

The Anchor element.

HTML element (or anchor element), with its href attribute, creates a hyperlink to web pages, files, email addresses, locations in the same page, or anything else a URL can address. Content within each <a> should indicate the link's destination.

6 0
2 years ago
Read 2 more answers
Other questions:
  • Write the HTML to create a hyperlink to the named fragment designated by “top”.
    10·1 answer
  • How do you solve this.
    12·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • All but one of the following statements about stored procedures is true. Which one is false? a. They consist of one or more SQL
    10·1 answer
  • Premiere Pro CS4 is the first version to be optimized for _______operating systems, although it is not natively 64-bit.
    10·1 answer
  • Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatog
    13·1 answer
  • What is the output?
    6·2 answers
  • 25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
    14·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!