TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Which formula should be used to find the area of a house shaped figure
what does peri mean for periscope?
how is the bladder and a balloon alike
Economists use graphs to analyze the choices and trade-offs that people make in a society. Please select the best answer from the choices provided T F
Write an equality and graph it. The stock is worth at least $14.50
The Age of Enlightenment introduced a new focus on A. freedom and reason. B. feminism and politics. C. liberalism and industry. D. religion and education.
What is the area of the figure?
A bite from an undomesticated animal may require a rabies shot a. True b. False
what are the first six multiples of 9
Disorders of the skin include all of the following except A. acne. B. osteoporosis. C. psoriasis. D. carcinomas.