TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Two similar triangles are shown below: Which two sets of angles are corresponding angles? (4 points) w and v; w and y; w and z; w and z;
Someone answer fast please and is the diagram i drew right?
What is the value of the expression below when x = 3 and y = 8 , 6x + 10y ? Please answer !!!!! Will mark brainliest !!!!!!!!!!!!
6 - 9x = 7x - 10x +18 what is the value of x
can someone help me with this question? i’ll give 20 points to the correct one
Explain one similarity in the role of serfs and vassals in the feudal system between 600 and 1450?
Help I’m too slow for this
Are these 3 right and do you know the middle one
is centigrams or grams bigger. example: which unit is larger. 35cg or 35 g
A pom-pom manufacturer makes each of its pom-poms with 35% white strands (w), 25% blue strands (b), and 40% red strands (r). If each pom-pom has a total of 80 s