TaehyungsGirl7192 TaehyungsGirl7192
  • 02-09-2020
  • Computers and Technology
contestada

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Respuesta :

isaacoranseola
isaacoranseola isaacoranseola
  • 02-09-2020

Answer:

Cyber attack

Explanation:

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers . A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.

Answer Link

Otras preguntas

Volume formula for a hemisphere and sphere?
Which document is referred to as the “supreme law of the land”? US Constitution Bill of Rights Declaration of Independence First Amendment
what is the equivalent expression for (24a+56b)
What tradition did the Bantu people bring with them throughout their migrations? farming hunting and gathering trading craftsmanship.
paco needs at least 3/8 yard of twine to build a model ship.how much twine could he buy
Modernist works could best be described as:
A ball is made of a plastic sphere covered with a layer of rubber. The plastic sphere has a radius of 18 in., and the ball itself has a radius of 22 in. What is
the number and location of bones of many fossil vertebrates are similar to those in living vertebrates. this is evidence in support of which of the following co
In which region of the African continent is the Niger River located? A. West Africa B. North Africa C. East Africa D. Southern Africa
I need a sentence with the word gracious