TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

What is 0.125 rounded to the nearest hundredth
which is bigger 0.6 or 0.58
Which of these has a y-intercept of (0,7)? Is it (A) f(x)=7(x-1)(x+5) (B) f(x)=3x(x-7) (C) f(x)=xx+2x+7
Vaughn is laying sod in his backyard. A diagram of his backyard is below. If a = 24 ft, b = 33 ft, and c = 37 ft, what is the area of the backyard? a 1,006.5 ft
how to change 4.1 into a decimal?
In Central Africa, the (blank) climate allows thick forests to grow. Please help
What did rich men wear in the 1600s?
Which personal pronoun correctly completes the sentence? What is its use? Even though the Millers knew it would erupt, Old Faithful's geyser surprised _________
Blonde hair (b) is recessive and black hair (B) is dominant. A woman with black hair marries a man with blonde hair who is homozygous recessive for blonde hair.
How did Reconstruction affect daily life in South Carolina?