answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
2 years ago
13

Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un

authorized process to occur or by granting unauthorized access is known as:
a. malicious code
b. trojan horse
c. hacking
d. peer-to-peer software
Computers and Technology
1 answer:
Vanyuwa [196]2 years ago
8 0
Trojan horse. They come in masked.
You might be interested in
The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
Arisa [49]

Answer:

C. instrument panel

Explanation:

In order to be able to operate your vehicle safely, you must know the functions and locations of all the interior mechanisms of your car.

The instrument panel contains gauges which include the following:

Speedometer, which indicates speed in both miles and kilometers per hour

Tachometer, which indicates rotations in the engine in revolutions per minute (RPMs)

Odometer, which indicates the total number of miles your car has been driven since it was manufactured

Fuel gauge, which shows the fuel level in your car's fuel tank

Oil gauge, which shows oil level

5 0
1 year ago
A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a compute
OverLord2011 [107]

Answer:

to be honest I don't know what the answer is

7 0
1 year ago
Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
ryzh [129]

Answer:

Category 6 Cabling

Explanation:

Category 6 cables are High-performance UTP cable that can transmit data 10/100/1000Mbps transfer and up to 10Gbps over shorter distances. They usually make uses of a longitudinal separator, this seperators always tend to separates each of the four pairs of wires from each other.

A twisted-pair cable is a cables that is mostly made of copper wires that are twisted around each other and are surrounded by a plastic jacket, twisted pair cables are majorly used for networking.

There are two types of twisted pair cable,

UTP (Unshielded Twisted Pair) are a type of twisted pair cabling that does not include shielding around its conductors.

STP(shielded twisted pair) are types of twisted pair cabling that does include shield around its conductors.

A category 6 cable can eithet be pure copper UTP or STP.

And they are best for networking.

7 0
1 year ago
Escribe, en los siguientes cuadros, los conceptos que correspondan
Fofino [41]

Answer:

Débito o debe                                                         Crédito o haber

Préstamo de la cooperativa                                          Efectivo

Gasto de arriendo                                              Cuentas por cobrar

Cuentas por pagar                                          Documentos por cobrar

Gasto de publicidad                                                Capital social

Hipoteca por pagar                                                       Ventas

Intereses pagados            Bancos (en el caso de cobros a través de bancos)

Bancos (en el caso que deba productos bancarios)

Explanation:

3 0
2 years ago
Select all the activities Samil could so through his banking app.
lisabon 2012 [21]

Answer:

Make a deposit

Talk to a representative

Transfer money

Check account balances

Explanation:

3 0
1 year ago
Read 2 more answers
Other questions:
  • Which of the following best describes the concept behind Web 2.0
    5·1 answer
  • Classify the given items as belonging to the public domain or protected by copyright law.
    6·2 answers
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled liv
    7·1 answer
  • Consider a set A = {a1, . . . , an} and a collection B1, B2, . . . , Bm of subsets of A (i.e., Bi ⊆ A for each i). We say that a
    12·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
  • In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?
    10·2 answers
  • You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must
    6·1 answer
  • a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!