TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

In a titration, 45.0 mL of KOH is neutralized by 75.0 mL of 0.30M HBr. How much KOH is in 1.0 liter of the KOH solution ?
A 3.7 kg object is lifted to a Hight of 3 meters what is the potential energy of this object
Pistachios were priced at 3 pounds for $ 6.99. (a) what were the price per pound? (b) how much would 10 pounds of pistachios cost?
What is the state at which a net force is zero called
A climber is on a hike.after 2 hours he is at an altitude of 400 feet. After 6 hours, he is at an altitude of 700 feet. What is the average rate of change?
What what handels full name
What substance is made during transcription and where does it occur
why did the citizens of Richmond, Virginia feel upset about the actions at Fort Sumter ?
Zoey made 6 3/4 cups of fruit salad for a picnic. At the picnic, they ate 1/3 of the fruit salad. How much fruit salad did they eat?
Which sentence uses a verb that agrees with its subject?A.In a dark corner of the attic were many unopened boxes.B.Across the surface of the water glides swans.