TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Researcher access to confidential records adds to the vulnerability of workers who participate in workplace studies. Inappropriate release of identifiable priva
what is the ratio of 4:7
Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while working in the office. She leaves t
A 5 mile jogging path diagonal divides a rectangular park in half. The park is 4 miles long. Find the width of the park.
30. The table below shows the number of ants in an ant farm on different days. The number of ants doubles every ten days. MAFS.J. Day 71 51 320 61 640 Number of
What example does Alan Weissman give to show that nature has little concerned for things that humans find important
Equivalent fractions of 7/8
Compare the decimals 0.29__0.3 Compare the decimals 0.40__0.04 Compare the decimals 0.73__0.7300
What do we know about the mother in "Two kinds"? Select all that apply.She came from ChineShe had two daughters who diedHer mother, her and first husband are de
Where were the first citites in North and South America built ?