A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a–
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer

1 Answer

Answer :

hacker

Related questions

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : Peopleware

Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst

Last Answer : Answer : C

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In what year did the motto's Novus Ordo Seclorum (New Order of the Age's), Annuit Coeptis (favors undertakings), and E Pluribus Unum (Out of many, one) start appearing on dollar bills?

Last Answer : Novus ordo seclorum and annuit coeptis since 1935. E pluribus unum since 1796. Wikipedia knows all.

Description : Crop logging’ is the method of? a. Soil fertility evaluation b. Plan analyst for assessing requirements for nutrients for crop production c. Assessing crop damage d. Testing suitability of fertilizers e. None of these

Last Answer : e. None of these

Description : Help me defeat Instant Messenger glitches?

Last Answer : Have you tried Yahoo? I believe they have a good IM thingy…can’t recall if I’ve ever tried it myself though.

Description : What is a good cross-platform Instant messenger service?

Last Answer : I like Pidgin, myself. There are a couple of other freeware chat clients.

Description : What's the possibility of apple releasing an AOL instant messenger application for like iPhone like you see on the T-Mobile Sidekick?

Last Answer : answer:Have you tried meebo? I don’t know how it works with iPhone, but I use it all the time for online ims. www.meebo.com

Description : How can AOL afford to offer their AIM Instant Messenger service to non-AOL users for free?

Last Answer : answer:Who knows these days in the old days it was to permit the AOL users to chat with the non-AOL users without the AOL users having to learn to use ICQ (and therefore diminish their premium AOL ... (I can't remember), but most clients pop up some scary warning when you try to directly connect.

Description : What are the chances of a good instant messenger like the one on the sidekick will be released for the iPhone when the SDK comes out?

Last Answer : answer:If you're interesting in jailbreaking your iPhone (which is well worth it if you're using AT&T, firmware hacks with other providers are a pain in the a**) there are two really great chat apps. Apollo ... know some of the other webapps can be a bit janky, but this one is spot on in my opinion.

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : Both of above

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : Which of the following is required to communicatebetween two computers? A. communications software B. protocol C. communicationshardware D. access to transmission medium E. All of theabov

Last Answer : All of theabov

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack

Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist

Last Answer : a. White hat hackers

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access

Last Answer : b. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack

Last Answer : A. Remote attack

Description : With early computers, the programmer had to translate instructions into what type of language form?

Last Answer : Machine.

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreake

Description : The writ of Prohibition is issued by a superior court - (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice (2) to an ... the office (4) to an authority to produce an illegally detained person before the court for trial.

Last Answer : (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice Explanation: The writ of Prohibition is an order from a superior ... because the lower court does not have proper jurisdiction to hear or determine the matters before it.

Description : Injury denotes any harm whatever illegally caused to any person- a) In body b) In mind c) In reputation d) All the above

Last Answer : d) All the above

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number

Description : A person has worked as a programmer in a company ; But the company did not pay its dues ; In that case, he can sell some of the company's programs to earn his own money ? I used to work ... I can sell it and get halal profit. These programs include some of the ones I developed during my tenure.

Last Answer : If someone works as a programmer in a company then the programs will be owned by the company. He can claim his unjust rights ; That is by mentioning his name in the program. If the company does not ... a person who has been able to acquire something similar to his debt ; If not similar, then not.

Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers

Last Answer : e) break into other people's computers

Description : President Trump suggested that all people who cross the border illegally (“invade” was the term he used) should be deported summarily, without a court hearing. Not Constitutional Law but is it another step in Trump running the country his way?

Last Answer : I mean, the guy did say that he would like people to treat him like the North Koreans treat Kim. He wants to be a dictator.

Description : Ryan, a newly hired systems analyst/consultant, is about to begin a systems project.  Where will Ryan look first to locate the identifiable tasks he will record in his work plan?  a. ... . the project planning software available at the local bookstore  e. the website of his old college professor

Last Answer : c. the company training materials for the company methodology

Description : Do the Mods prefer us to flag the spammer or the spam when we see it?

Last Answer : I think flagging the question is more useful. It notifies the mods about both the question and the poster.

Description : (Extremely stupid question) How can I report a spammer?

Last Answer : There is a Flag As button in the lower right.

Description : A question for mods: supposed there's nothing to indicate a jelly is a spammer in their profile, how many times can they spam until their account gets modded altogether?

Last Answer : answer:I've never been a mod here but my guess is that if a user's first post is blatant spam, then they're banned ASAP, with the intention of not getting another chance to post. I don't ... circumstance has ever asked for reinstatement, but I guess if they did, they might be given one more chance.

Description : Did you know some spammer have spines? Who would actually do this "work"?

Last Answer : There are desperate, computer savvy people in India that “farm” on Farmville for a small fee. How sad – for both sides of the funds transfer.

Description : Can the mods please deal with this ridiculous spammer (details inside).

Last Answer : I’ve only ever gotten 1 of that type since I’ve been here. What? I’m not pretty enough? I’m not spiritual enough? I shower fairly regularly! I guess true love just isn’t in my stars.

Description : How do you spread word/advertise a site, without paid advertisements and not be considered a spammer?

Last Answer : Is this a commercial site? If not, you should try to get listed on search engines like Yahoo. You could also seek out sites related to yours that might be interested in connecting to your site.

Description : How did a spammer get a hold of my friend's email account and send spam from her email address?

Last Answer : She must have downloaded an infested file (with a spyware or adware attached) which used her address book to send spam. She should run a virus test. Most likely she is unaware of this. There ... called AdAware-a free version is available and might help rid her computer of many spy and adware.

Description : Gmail says I'm a spammer. How to avoid this?

Last Answer : answer:Gmail isn't the best tool to send mass email. You're better off using an email service provider. Ask-public uses VerticalResponse for its email marketing.

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : The dazed expression on people's faces was caused by (1) the blow to their heads. (2) the heat generated by the blast. (3) The suddenness and extent of damage caused by the impact of the blast. (4) the impact of broken glass and crockery being hurled around in the confusion

Last Answer : (3) The suddenness and extent of damage caused by the impact of the blast

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing