TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

A triangle has an angle that measures 90°. What type of triangle could it be? (Choose all that apply) scalene acute isosceles right
which numbers are 4 units from -2 on the number line
In 1804 the 12th Amendment changed the way the United States
answer plz answer this question
What is the difference between child abuse and child neglect?
Subtract. −9.3+6.8 Enter your answer, as a decimal, in the box. I need help quick! Please and Thank you
Help please! The girls spent countless hours at the aquatics center each day refining their routine. Before long, they had formed a strong bond both in and out
What is the relationship between 5.34x10^5 and 5.34x10^-2 Select from the drop down menus to correctly complete the statement. 5.34x10^5 is 1.)______ times 2.)
Find the density of ethyl alcohol if the volume is 80. mL and the mass is 1.6 g.
Help me plz I need help