TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

A ball that rolls on the ground is initially propelled with a speed of 45 km / h and after 10 seconds it stops. Assuming you lost speed constantly, then: a) Cal
Weekly wages at a certain factory are normally distributed with a mean of $400 and a standard deviation of $50. Find the probability that a worker selected at r
The quadrilateral MNOP is a trapezoid. If MQ ≅ NR and m∠NMQ - 140° calculate m∠MNR.
I am not sure what is the answer
A survey of 500 randomly selected adults found that 57% say that they would take a ride in a fully self-driving car. The 95% confidence interval for the true pr
PLEASE HELP PLEASE WILL MARK BRAINLY
What is the justification for step 3 in the solution process?0.8a - 0.1 a= a - 2.5Step 1: 0.7a= a - 2.5Step 2: -0.3a = -2.5Step 3:a= 8.3OA.the division property
Explain four roles of the South African media with regard to gender based violence (6)
Identify the statements that correctly describe the story of the ancient Hebrews . The people first had a polytheistic religion that involved worshiping many go
Find the value of x.