26sarahbeckhoff 26sarahbeckhoff
  • 22-09-2020
  • Engineering
contestada

Gaining unauthorized access to a computer's data is called (5 points)
hacking
identity theft
netiquette
scamming

Respuesta :

emilybowmannn emilybowmannn
  • 22-09-2020
Hacking is correcttttttttt
Answer Link
marleyavello456 marleyavello456
  • 02-03-2022

Answer:

hacking

Explanation:

uh a stranger getting access to you're information..

Answer Link

Otras preguntas

A spinner has five sections, labeled A, B, C, D, and E. The spinner is spun 84 times, and the results are recorded in the table. Outcome Number of times outcome
whats 43/21 rounded to the nearest hundredth
Zero population growth is the maintenance of a population at a constant level by limiting the number of live births to that needed to replace the existing popul
Suppose that a function does have an inverse. The graph of its inverse will be the reflection of the graph of the function over which of the following? Choose o
The radius of a circle is 8 kilometers. What is the length of a 45° arc?
Which of the following would cause the molecules in matter to change? Please help :) a. a moderate climate b. pressure c. motion d. extreme heat
CAN SOMEONE HELP ME PLEASE!!! Read the following excerpt from a speech. Which sentence best shows the main idea of the speech? [[Social media helps us keep
Please help One of the steps Dave used to solve an equation is shown below. 3x+9=21 3x+9-9=21-9 Which statement describes the procedure Dave used in this step
need all of your opinions, I will do a graphic how do you learn more, by sight or hear?
What civilization in Greece was powerful 3,200 years ago?