katrinamorgan6377 katrinamorgan6377
  • 31-12-2019
  • Computers and Technology
contestada

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as a. hacking. b. hijacking. c. sniffing. d. phreaking.

Respuesta :

bandos1 bandos1
  • 31-12-2019
Possibly “sniffing” ?
Answer Link

Otras preguntas

8.73 x0.7 help wantd
Which of the following cuts can often end up as pastrami? A. Shank B. Round C. Flank D. Brisket
Which specialized cells are responsible for transmitting messages throughout the body? neurons epithelial cells blood cells muscle cells
Which is the order of these solutions from strong acid to strong base?solutions:household ammoniabattery acidbaking sodastomach acidantacid?
△EFG≅△JKL. What is m∠L?
How many x-intercepts does the graph of y = 4x^2 + 5x + 2 have? A. 1 B. 0 C. 2
The amounts of food waste generated in a region for 2 years were 37,500,000 tons and 30,400,000 tons. What was the total food waste generated in the region for
What is the solution to the following system of equations?
Which is correct? A. There are 0.35 hectoliters in 35 deciliters. B. There are 7.62 centiliters in 762 liters. C. There are 6.8 kiloliters in 68 hectoliter
1. Using the associative property of multiplication, which expression is equivalent to 6(4x)? a. 4(6x) b. (6*4) (x) c. 24x d. 4(6 + x) 2. Use the associative