Describe hacking. -Technology

1 Answer

Answer :

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose.

Related questions

Description : What are your greatest hacking exploits?

Last Answer : Does using Astroglide to lube a lizard stuck in a flower pots hole count?

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : What is the appeal of hacking?

Last Answer : answer:It's a challenge. Like with any skill, you learn it and want to apply it and use it, then you feel you're pretty good at it, so you want to hone it more and try to take it to the next ... most famous hackers said he hacked into things just to see if he could do it. It sounds like such a rush.

Description : What do you think about anonymous hacking sony?

Last Answer : Was it done by 4chan?

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : In which year, hacking became a practical crime and a matter of concern in the field of technology? a) 1971 b) 1973 c) 1970 d) 1974

Last Answer : c) 1970

Description : Describe the main applications of a computer. -Technology

Last Answer : Now-a-days, computer has been employed in almost all the aspects of professional and personal life of human beings. Some of the areas where computers are being used are as follows:1. Education ... and graphics must be created individually, then cut out and pasted down to form a page layout.

Description : Describe an application software. -Technology

Last Answer : An application software is designed to help the user to perform specific functions.

Description : Describe utility software and also define its types. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is usually called a ... file system which can be mounted by the operating system and treated as an individual drive.

Description : Mr. X has recently installed a new operating system on his computer 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware and application softwares to be loaded; gives prompts and error reports to the users.2. Antivirus and compression tool.

Description : The processed form of data is called information. Describe the further refinement of term information. -Technology

Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.

Description : Describe the various components of multimedia. -Technology

Last Answer : Various components of multimedia are described as follows:1. Text It is the most widely used and flexible means of representing information on screen and conveying ideas. It is not always a good idea to ... In multimedia, now-a-days animation is being used as 2-D animation and 3-D animation.

Description : Suchi has recently installed a new operating system on her computer. 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware, enables applications, software to be loaded; gives prompts and error reports to the users.2. Command-driven user interface means CUI, by which a user gives instructions via typing command onto the computer.

Description : Describe the use of alt attribute with tag. -Technology

Last Answer : The alt attribute is used to define alternate text' for an image. It tells the Website visitor, what he/she is missing on the page if the browser cannot load images. The browser will then ... include alt attribute for each image on a page to improve the appearance and usefulness of the document.

Description : Start menu is a gateway to the applications. Describe it. -Technology

Last Answer : The Start menu is a gateway to the applications that are present on your computer. The left side of the Start menu lists programs, and the right side allows access to common windows folders. It also provides access to Help and Support, Search and Run options.

Description : Describe a Drive. -Technology

Last Answer : DrivesA drive or disk drive is a hardware device in which you can store files and folders. Disk drives are assigned by a letter (e.g. C, D, E etc.)Your hard drive (the drive inside your ... The computer assigns A: and B: drives to floppy disks and sometimes other removable media such as tape drives.

Description : Describe the basic operations of mouse button. -Technology

Last Answer : Some basic mouse operations are as follows:1. Pointing Pointing to an item on the screen means moving a pointer to a certain location. When you point to some object, a small box often appears, that ... Right click an item, point to the item that you want perform and then, click the left button.

Description : Describe the various parts of the folder window. -Technology

Last Answer : It is a location where you can store your files. You can create any number of folders and even you can store a folder into other folders (sub-folders). Windows use various folders to store and manage ... list are organised.7. File List This is the list of contents of the current folder or library.

Description : Describe the concept of tiling and cascading windows. -Technology

Last Answer : Tiling and Cascading WindowsSometimes, moving and resizing multiple windows can create confusion. To keep better track of multiple windows, try cascading or tiling the windows. In cascading, windows are ... stacked (for tiling horizontally) or Show windows side-by-side (for tiling vertically).

Description : Describe the border attribute of tag. -Technology

Last Answer : The border attribute is used to define- the thickness of the border, which surrounds the table.

Description : By which we can describe the properties of elements? -Technology

Last Answer : The properties of elements can be described through attributes.

Description : ……….. is used to describe data and ……….. is used to display data. -Technology

Last Answer : XML is used to describe data and HTMLis used to display data.

Description : XML is design to describe data. -Technology

Last Answer : True The focus of XML is on the description of data, not its presentation.

Description : XML uses a DTD to describe its data to users. -Technology

Last Answer : True The DTD are used in XML to specify its information and data to users.

Description : Describe, how the owner of the restaurant could use the spreadsheet for financial modeling? -Technology

Last Answer : 1. Decide on a total purchasing need for next night/week/month/year.2. Change figures in spreadsheet.3. Raise/lower/add/delete any value.4. Compare results with predicted/total needed/target results.5. To general use for budgeting like to calculate profit.

Description : Describe some of the recent forms of advertising. -Technology

Last Answer : Celebrity endorsements can be very popular and build strong associations in the buyers.Merchandise- good, clothes bearing the logo or names or designs of the products are another popular way to ... in promoting products and services. It embeds a product or brand in entertainment and media.

Description : Describe the various computer hardware that are required to create multimedia projects. -Technology

Last Answer : The answer can be drawn from the following CPU-The CPU of a multimedia computer should be at least 486 with math coprocessor. The Pentium processor is more efficient and is usually referred in ... touchscreen is used where the user is required to touch the surface of the screen or monitor.

Description : Based on your assessment, describe the implications of APUPA pattern on library classification? -Technology

Last Answer : a. APUPA stands for Alien-Penumbral-Umbral-Penumbral-Alienb. In this pattern, one arranges the most relevant documents at the centre, provides documents of marginal relevance on both sides of relevant ... This is the best way to maintain filiatory sequencee. APUPA arrangement diagramf. Example . . .

Description : Is it possible that PETA or the Vegetarian Society or some similar group is responsible for hacking the beef producer yesterday?

Last Answer : I don’t see that as within their capabilities or within their MO. I blame Canada – just kidding!

Description : What is the action you are anticipating regarding hacking by Russia?

Last Answer : nothing

Description : Any ideas on how my daughter's ex keeps hacking her face book account?

Last Answer : Police will deal with it!

Description : Gary McKinnon's extradition to the USA on computer hacking charges has been blocked by the UK's Home Secretary. Any thoughts on this from the Fluther community?

Last Answer : Maybe he's also a paranoid schizophrenic conspiracy theorist that gets messages from his dead aunt Lulus teddy bear. So what? Regardless of his mental health he needs to suffer the consequences of his ... whatever they have done, wherever they have done it, in the order the crimes were perpetrated.

Description : What are some movies about computers and hacking?

Last Answer : Sneakers Fun movie; all-star cast. It was sort of sad watching Gandhi play the villain though.

Description : How did someone manage this hacking/identity theft and what else can we do about it?

Last Answer : Someone was arrested after stealing my identity, and cashing 2 checks in Georgia that nearly reached $10,000. The person who did it was a Bank of America employee, who had access to all my ... could have been anyone. A former IP person at your husbands work would easily have all that information.

Description : Can anyone walk me thru the steps of hacking Samsung Behold 2 and installing android 1.6?

Last Answer : answer:Well, from what I see, it already runs Android. What I really want to know is why you would want 1.6 on it rather than 2.2. Care to explain?

Description : Is hacking for the well being of someone a good thing to do?

Last Answer : answer:No. You should fix whatever damage you did, and then ban yourself from the internet.

Description : When people say that their Facebook or Myspace "was hacked into"... what is the usual cause that led to the successful hacking?

Last Answer : Usually if it’s hacked, it’s by a friend. Sometimes friends tell each other a bit too much, most of the time friends stop liking each other and this password gets passed on to other people. As far as it getting hacked by a random. Well, I’m not sure.

Description : Are people hacking into my computer?

Last Answer : Stop downloading “stuff” especially if you admit that you’re technology illiterate. It’s most likely slow cause of all the junk you have.

Description : What does "Hacking Education" mean?

Last Answer : It is simply the title of the conference. “hack” can mean to cut awake to make clear, like hacking a path through the forest. My guess is that it is referring to clearing the clutter from education, seeing what it really is, and making the necessary changes.

Description : Is email hacking illegal?

Last Answer : Well considering it’s illegal to read someones mail without consent, I’m guessing the same is applied to email. I don’t know the exact law you are breaking by doing it, but I’m sure a lawyer could find something.

Description : What is the best anti-virus/anti-spyware/anti-hacking program (free or not free) out there?

Last Answer : They are all very very similar, all of the big guys (Trend, Symantec, Macafee) collaborate on their virus definitions to lower development costs and to speed up the reaction time to outbreaks. The main ... computer I would simply find one that was on special and get it on the cheap. Cheers! Mike

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : How can I change the picture ( apple logo ) when my iPod restarts without hacking?

Last Answer : No.

Description : If you encrypt an Excel file in a folder on your desktop, what does that mean? that the file is safe from hacking?

Last Answer : Safe from the average nosy person? Probably. Safe from some who knows what they are doing and really wants it? Probably not. It depends on how it was encrypted and how bad someone wants it.

Description : Does the new trick involving fring and hacking an ivoice3 ( to make phone calls on iPod touch) work on the 1st generation iPod?

Last Answer : 1st gen has no audio input(mic).

Description : Anti-hacking activities - Explain ?

Last Answer : Hacking is the act of using a computer to enter a computer network without permission. In the light of morality, hacking is an anti-moral act. Because through this one person or hacker can ... and the person and organization suffers loss. For all these reasons, hacking is an anti-moral activity.

Description : At what age did Michael Kelsey become involved in hacking ?

Last Answer : : Michael Kelsey became involved in hacking at the age of 15 .

Description : What is hacking ?

Last Answer : Hacking is the act of writing and executing a program to enter a computer network without permission and steal the necessary files from the computer. Anyone who does this is called a hacker.

Description : What do you call hacking ?

Last Answer : Those who hack are called hackers.

Last Answer : There is no good institute in Bangladesh for learning ethical hacking. And you can't learn hacking just by doing a course of ethical hacking. If you want to learn Ethical Hacking, you can ... the Dark Web with awareness. However, the condition is to know English and previous experience in hacking.