1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
2 years ago
12

Is hacking always wrong? Creating viruses?

Computers and Technology
2 answers:
nalin [4]2 years ago
6 0

Answer:

yes

Explanation:

-Dominant- [34]2 years ago
6 0

Answer:

Not every “hack” is bad, and not every hacker is a criminal. In fact, many hackers secure websites and companies from malicious actors.

creating viruses is done by negative intention hackers

You might be interested in
A 4-bit left shift register is initially in the 0000 state, with all the flip flops storing 0s. A group of bits 1011 is serially
frutty [35]

Answer:

0010

Explanation:

Serially left shifted means that the left most bit will enter the register first. The left most bit already stored in the register will move out of the sequence. The "bold" bits mentioned below highlight these left most bits:

Initial State of the Register:

0000

Group of bits entering:

1011

<u>First Clock Cycle:</u>

0000 <em>(This bold bit will move out)</em>

1011 <em>(This bold bit will move in from right side, shifting the whole sequence one place to the left).</em>

The resulting Sequence:

0001

<u>Second Clock Cycle:</u>

0001 <em>(This bold bit will move out)</em>

1011 <em>(This bold bit will move in from right side, shifting the whole sequence one place to the left).</em>

The resulting Sequence:

0010 <em>(Final Answer)</em>

6 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
What is one similarity between compiled and interpreted programming languages? (5 points)
Rashid [163]

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, <u>the similarity between both languages is that they are high level languages and translate code for a computer to understand. </u>

8 0
2 years ago
HELP BRAINLIEST FOR RIGHT ANSWER
Scilla [17]

Answer:

true I know this cuz I smart

7 0
3 years ago
Read 2 more answers
Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prin
Vladimir79 [104]

Answer:

Answered below

Explanation:

//Program in Java

class MyInfo{

public static void main (String args []){

myFullName("John", "Doe");

myAgeMajorGPA(20, "Biology", 4.3);

}

public void myFullName(String initialName, String middleName){

System.out.println(initialName);

System.out.print(middleName);

}

public void myAgeMajorGPA(int age, String major, double GPA){

System.out.println(age);

System.out.println(GPA);

System.out.print(major);

}

}

3 0
2 years ago
Other questions:
  • Write a Raptor program that will generate a random number between 1 and 100; do not display the randomly generated number. Let t
    8·2 answers
  • A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
    8·1 answer
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • Jenny is the project manager and her company. She needs to break her current project into parts that her employees can work on.
    10·1 answer
  • If a computer is not working properly,the best thing to do is ________?
    5·2 answers
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • Why is dark supereffective against ghost?
    5·2 answers
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
  • which responses would you use for a computer or electronic medical record outage? (select all that apply)
    8·1 answer
  • Looking for similarities between concepts or problems is referred to as
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!