A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a -
1 Hacker
2 Spammer
3 Analyst
4 Programmer

1 Answer

Answer :

1 Hacker

Related questions

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst

Last Answer : Answer : C

Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreake

Description : How did a spammer get a hold of my friend's email account and send spam from her email address?

Last Answer : She must have downloaded an infested file (with a spyware or adware attached) which used her address book to send spam. She should run a virus test. Most likely she is unaware of this. There ... called AdAware-a free version is available and might help rid her computer of many spy and adware.

Description : Crop logging’ is the method of? a. Soil fertility evaluation b. Plan analyst for assessing requirements for nutrients for crop production c. Assessing crop damage d. Testing suitability of fertilizers e. None of these

Last Answer : e. None of these

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers

Last Answer : e) break into other people's computers

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... . d. The procedures performed do not enable the accountant to express any form of assurance.

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... form. d. The procedures performed do not enable the accountant to express any form of assurance

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information.

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False

Last Answer : a) True

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : A person who designs the programs in a software package is called : a) User b) Software Manager c) System Developer d) System Programmer

Last Answer : Answer: d Explanation: The programs included in a system software package are called system programs. The programmers who design them and prepare them are called system programmers

Description : A person who creates software is called a: a) Programmer b) Software Engineer c) Software Developer d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above

Last Answer : e) None of These

Description : The person who writes and tests computer programs is called a: a) Programmer b) Software Engineer c) Project Developer d) None of These

Last Answer : b) Software Engineer

Description : The person who writes and tests computer programs is called a a) programmer b) computer scientist c) software engineer d) project developer e) None of these

Last Answer : c) software engineer

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Evidence contained in a document provided to prove that statements made in court are True is referred to as: a. Inadmissible evidence b. Illegally obtained evidence c. Hearsay evidence d. Direct evidence

Last Answer : c. Hearsay evidence

Description : With early computers, the programmer had to translate instructions into what type of language form?

Last Answer : Machine.

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : Lauren, a systems analyst, has excellent interpersonal skills. To take advantage of her  skills, the functional lead of the project should assign her to program in Java and C++

Last Answer : Ans: False

Description : The writ of Prohibition is issued by a superior court - (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice (2) to an ... the office (4) to an authority to produce an illegally detained person before the court for trial.

Last Answer : (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice Explanation: The writ of Prohibition is an order from a superior ... because the lower court does not have proper jurisdiction to hear or determine the matters before it.

Description : Injury denotes any harm whatever illegally caused to any person- a) In body b) In mind c) In reputation d) All the above

Last Answer : d) All the above

Description : A person has worked as a programmer in a company ; But the company did not pay its dues ; In that case, he can sell some of the company's programs to earn his own money ? I used to work ... I can sell it and get halal profit. These programs include some of the ones I developed during my tenure.

Last Answer : If someone works as a programmer in a company then the programs will be owned by the company. He can claim his unjust rights ; That is by mentioning his name in the program. If the company does not ... a person who has been able to acquire something similar to his debt ; If not similar, then not.

Description : President Trump suggested that all people who cross the border illegally (“invade” was the term he used) should be deported summarily, without a court hearing. Not Constitutional Law but is it another step in Trump running the country his way?

Last Answer : I mean, the guy did say that he would like people to treat him like the North Koreans treat Kim. He wants to be a dictator.

Description : Do the Mods prefer us to flag the spammer or the spam when we see it?

Last Answer : I think flagging the question is more useful. It notifies the mods about both the question and the poster.