TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

lonic compounds form between elements thatare metals and elements that are____​
1" on a map peen = a mile in real life or on the surface of the Earth is an example of what you might find on the maps
primary structure of monocot and dicot shoot and more information and explanation about it​
What did Olympe de Gouges and Mary Wollstonecraft have in common? O A. Both were executed after opposing the leaders of the French Revolution. O B. Both rewrote
let (-3,-2) be a point on the terminal side of 0. find the exact values of cos0 csc0 and tan0
I need help please and thank you
These maps show changes that occurred between 2006 (left) and 2015 (right). Sidor Ozone (Dobson units) Which sentence best describes the changes shown? A. The h
________ is it possible to tell how long ago someone smoked marijuana
An individual with a fasting plasma glucose level of 90 mg/dl and oral glucose tolerance test value of 120 mg/dl would have:
A line having a slope of 3/4 passes through the point(-8,4) Write the equation of this line