TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Write a definition of a prime number
what are the old name's of patna?​
Mettez les phrases au négatif. [2] i) C’est un cahier. .........................................................................................................
[tex] \frac{ log(8) - log(4) }{ log(6) - log(3) } [/tex]Please how can I solve this?​
In Seventh man Why has the writer switched from past tense verbs in paragraph 45 to present tense verbs in paragraph 46?
Find the slope of the line on the graph. Write your answer as a fraction or a whole number, not a mixed number or decimal.
y = − x + 1 y=−x+1 2 x − y = 2 2x−y=2
Jane bought a sofa on sale for $629. This price was 26% less than the original price. What was the original price? ​
Rewrite 5-3/4x=7/12 so that it does not have fractions
let the function p be defined by p(x) = x^3 + 10x^2 - 23x - 132 where (x + 11) is a factor. to rewrite the function as the product of two factors, long division