TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Why did President Truman veto the Taft-Hartley Act?
Because the United States imports about 4 billion barrels of crude every year, at best, the Arctic National Wildlife Refuge could provide us with nearly one hun
Order from greatest to least 2.007; 2.714; 2.09; 2.97
after 3/4 of a minute a sloth has moved just 3/8 of a foot. what is the sloths speed on feet per minute.
The table shows the number of Salvador has read. Find the ratio of mystery books to the total. Explain it's meaning. (look at the picture of the table)
type O, while the blood type of Mr. Johnson has Type A blood. The lawyer claims that Mr. Johnson cannot be the father of a child with Type O blood. Is the attor
What are the 4 types of processes that cycle matter through the biosphere give examples?
how does 0.008 compare to 0.08?
which ocean contains many icebergs
There is 1/4 ounce of yeast in every 2 1/4 teaspoons of years. A recipe for bread calls for 2 teaspoons of yeast. How many ounces of yeast are needed for this r