answersLogoWhite

0


Best Answer

It is called hacking

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

A hacker

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the unauthorized use of a computer called?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


What Refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer?

Security


Is the use of computer or its data for unapproved or possibly illegal activities?

Unauthorized


Is a security software program that protects a computer from access by unauthorized users.?

That's called a firewall.


Disadvantages of unauthorized use of computer computer system and computer network?

stolen personal information. Damage to the computer system and/or network. Always protect your computer and network. theres more disadvantages...but use your head and think..


3 Discuss techniques to prevent unauthorized computer access and use?

Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe.


What is it called when somebody hacks into your computer?

if you mean the term virus, but if you mean the person a hacker unauthorized acces to your pc.


What are software programs or hardware devices that are used to prevent unauthorized access to someone's computer called?

anti spyware


What computer program is designed to surreptitously enter a computer program gain unauthorized access to data or disrupt normal processing operations?

computer virus


What is The attempted or successful unauthorized access use disclosure modification or destruction of information or interference with system operations in an information system is called?

The attempted or successful unauthorized access, use, disclosure, modification or destruction of information or interference with system operations in an information system is called:


What are the drawback of networking computer?

It makes the computer vulnerable to unauthorized access through the network.


What was the impact of the Computer Misuse Act of 1990?

The computer Misuse Act of 1990 made provision for securing computer material against unauthorized access or modification. Its impact to people is to refrain from any unauthorized use of computer data.