TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

f(x) =(2x+1)(x^2-3)^4, then f'(x) =?
the word parallel means ____ A. Meeting at a 90 degree angle. B. Vibrating back and forth. C. Along the same direction D. Having crests and troughs.
The smaller triangle is the image of the larger triangle after a dilation. The center of the dilation is (−3,−2). What is the scale factor used to create the di
Fragmentation of policy making is encouraged by
Plz hurry Which of the following contribute to the high cost of healthcare in the United States? Select all that apply. increasing educational costs decreasin
In order to gain more rights, the plebs __________.
Describe the two most important events in the history of animal life that occurred at the beginning and at the end of the Paleozoic era. (2 pts) List and briefl
Could there be a creature bigger than a blue whale
PLLLLLLZZZZ HELP!! MULTIPLE CHOICE!! Find the value of x and y. A) x=15, y=12 B) x=14, y=11 C) x=14, y=12 D) x=15, y=11
What transformation is represented by the following coordinate mapping? (a,b) → (a, -b)