TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Over the past 40 years, technological advances have reduced the cost of computer chips. how do you think this has affected the market for computers? for compute
What is the value of 2 + 5x – x2 when x = –2 ?
Keela can read 2/7 of a book in 3/4 of an hour. How long will it take her to read one full book
What is the product of (5√5)(6√4)? Simplify your answer. Thank You!
Which of the following was the largest Spanish colony by the end of the eighteeth century? A. Argentina B. Cuba C. New Mexico D. Puerto Rico The answer is C.
A European arms race developed between nations seeking possessions in Japan and Russia.
please help there’s 3 questions at the bottom left.
Who were the Canaanites and their characteristics?
Which structure could be found in both a prokaryotic cell and a eukaryotic cell?
Scatter plots & trend lines is there a easier way to do this?