answersLogoWhite

0


Best Answer

A hacker is someone who take time on a computer to learn how to manipulate the system and have access to the system.

Hacking is the process of manipulating data in order to get into the system without permision

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago
i dont know im nine years old my dad might know though maybe kinda not really.Fraud Is when someone mislead others for personal gain or to hurt someone, computer hacking is when someone hacks into someone else's computer to manipulate their software and how the computer is run.
This answer is:
User Avatar

User Avatar

Wiki User

9y ago

The hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks, And what hackers do is named as hacking.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the difference between a computer hacker and a computer fraud?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

What law do computer hackers break?

The computer Misuse Act.Hacking is not an illegal activity. That is, there are no laws against hacking per se. Hacking only becomes illegal when an actual law is broken. Hacking is a general term that originally applied to software and firmware programs where hackers would reverse engineer other company's intellectual property to see how it worked and possibly adapting it for another purpose. This is no different to taking an engine apart and adapting it for your own use. However, if the hacker then attempts to sell the modified software as his own, it becomes illegal -- software theft. Hacking also extends to networks, where the hacker will infiltrate a network with a view to stealing information. This is also illegal. However, hackers are often employed to test a network's security. This is perfectly legal because the hacker is under contract. The terms white-hat hacker and black-hat hacker are commonly used to differentiate between the legal and illegal forms of hacking. Illegal forms of hacking are usually covered by computer fraud and computer abuse laws.The computer 'Minuse Act'. Apparently.............although I think it is illegal anyway...........just my opinion.


Whether SSI Engg HRD is a consultancy or company. I got one mail from there....if i pay 750- ..they will give opportunity for job...so at what level it will give..shall we believe it are not?

Its fraud fraud fraud


Was Graham Bell a fraud?

Yes, he is.


Is invent help a fraud?

Yes


What is a criminal hacker?

Originally the term referred to people who used a razor blade and/or fingernail clippers to "hack" or roughly cut parts in electronics such as the traces on circuit boards, legs of diodes etc. Police scanners were "hacked" in order to add more memory, remove CPU processors , speed up scanning by "hacking" the crystal oscillator and replacing with faster ones. Thes methods are directly related to why computers now have more RAM, and are faster. Some of the old (and I do mean old) "hackers" devised a system in the 1960s to simultaneously send voice and data over a phone line using frequency phase shifting and filtering. A similar process used later by DSL."Hacking" and "Modding" evolved into things such as examining the programming of a thing. Beginning with noticing things such that by pressing certain keys or combinations of keys in certain secquences on a device could produce certain results. Following the era of IBM's "Big Blue" chess tournament, AT&T introduced the "unbeatable Tic Tac Toe Computer, and exhibited it. I, I mean a "hacker" back then, was able to beat the computer with a sequence of key presses in order to "cheat" the computer out of a move. On many Shortwave radios, Police Scanners, even cell phones etc, certain key presses are used in the programming, and could be used to alter that programming.The keys on a keyboard of a device are a "Matrix" Keyboards use a matrix with the rows and columns made up of wires. Each key acts like a switch. When a key is pressed, a column wire makes contact with a row wire and completes a circuit. The keyboard controller detects this closed circuit and registers it as a key press to the software.I'm going to try to keep this understandable to readers ...Software can emulate or act like hardware.Example: a hardware modem versus a DSP/Digital Signal Processor modem, where a chip is programmed to act like the hardware....So, later, the focus turned even more from "hacking" the actual electronics and hardware to software "hacking" through PROGRAMMING.A "black hat" hacker is often referred to as a microcomputer user who attempts to gain unauthorized access to proprietary computer systems. Although that could be a "cracker" ... a person cracking passwords etc.Most often people who call themselves "hackers" are called "wannabes" by the old-timers, and nowadays are often adolescents using a program they didn't write, by clicking a button they didn't create, to do what don't understand, in an attempt to disrupt something they don't know how to fix."White Hat" hackers are the "good guys" like ... Like the old-timers who vastly improved what computers are capable of doing, and the ones currently trying to improve security by locating and preventing weaknesses.This Answer is dedicated to the memory of Bill Cheek, author, The Scanner Modification Handbook series, and his BBS and Fidonet terminal (prior to "The Internet") Good man, Good freind to many... May he R.I.P.

Related questions

What is the difference between fraud and misinterpretation what do you undersatnd by mistake?

What is the difference between fraud and misinterpretation what do you undersatnd by mistake?


When a hacker steals personal information with the intent of impersonating another individual to commit fraud this is known as?

impersonation fraud


Difference between fraud and misrepresentation?

Difference between fraud and Misinterpretation1. Fraud is always done Intentionally, Misinterpretation can be preformed Intentionally or Negligently.2. Fraud always have malicious intent, Misinterpretation may not have malicious intent to deceive if it happens negligently through a misstatement and/or omission of a material fact(s)


What is a computer fraud?

Computer fraud is a criminal offense punishable by jail time and fines under the Computer Fraud and Abuse .


How much gold has crazy Russian Hacker found?

0 - he's a fraud xdloooool


Difference between check fraud felony and misdemeanor?

Is the amount the deciding factor?


What is the difference between fraud and abuse?

Abuse is to treat in a harmful, injurious or in an offensive way. Fraud is a breach of confidence for profit or gain to a dishonest advantage


What is the difference between auditing and fraud examination?

An error represents an unintentional misstatement of the financial statement. it may be material or immaterial. fraud represents an intentional misstatement of the financial statement which can be material or immaterial.


What is the difference between fraudulent financial reporting and misappropriation of assets?

One is really fraud where the other in not correctly stated.


What is the difference between scam and fraud?

In general parlance, scam is done against a particular system while fraud is done against an individual. In case of scam the loopholes in systems are abused while in case of a fraud the ignorance of the victim is abused.


What is Computer Fraud and Abuse?

Under the Computer Fraud and Abuse Act of 1986, this law covers safeguards against cybercrime and other frauds and exploits that can be done with a computer.


What is the difference between hacking and electronic fraud?

Hacking is the process of gaining entry to another computer or server without the owner's permission. e.g. hacking into your e-mail and sending weird e-mails to your friends. Fraud is trying to trick someone to gain an advatage. e.g. never delivering the product you paid for when buying on internet. . :]