Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called

Answers

Answer 1

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.


Related Questions

A(n) ______ database is a huge database used to analyze transactions. a. object-oriented b. relational c. data warehouse d. distributed

Answers

Answer:

c. Data warehouse

Explanation:

Data warehouse is a system used for reporting and data analysis. As you need to analyze transactions, so that is the database that fits better for your case.

Which of these questions would help you determine the context of a
television commercial?
A. Where was my television made?
B. Why was this commercial made?
C. How long is this commercial?
D. How well do I like this commercial?

Answers

B
To understand the context of a television commercial you need to know why the show was made in the first place

What are the top 10 most dangerous computer viruses ?

Answers

Answer:

MydoomSobigKlezILOVEYOUWannaCryZeusCode RedSlammerCryptoLockerSasser

Explanation:

Vector images generally do not permit fonts

True or False

Answers

Answer:

false

Explanation:

You can use fonts on a majority of programs

which tool would you use to configure the paging file location and size on a windows system?

Answers

Advanced System Settings in Control Panel.

Utility software, such as virus checker, screen saver, and security software, is usually installed on a PC ____.

Answers

Answer:

Operating System

Explanation:

The operating system is meant to run software.

25POINTS
Bias in the development of computational artifacts often arises from _____.
SELECT 2 answeres

A. testing software

B. including outliers

C. conscious bias

D. unconscious stereotyping

E. accurate data

Answers

Answer:

the answer would be A

Explanation:

Answer: unconscious stereotyping & conscious bias

Explanation: have a good day/ night <3!

4.
(1 pc
If
1-
= 100 and
= 10, what number is represented below?

A 471) B 470) C 740) D 4,700

Answers

Answer:

my answer is 470

Explanation:

hope it helps and good luck on your studies

Answer:

470

Explanation:

First, think, how many blocks are there in the picture?

Remember 100 is bigger than 10, so the blocks or cubes have more value.

If you look, there are 4 blocks, so you now know 4 is your first digit.

Now, look...

How many sticks are there?

7 in the picture.

So...

Now you know 7 is your second digit.

Since there is no "one's", fill in the third digit with a zero, because there is no "one's" in this picture.

Therefore, 470 is your answer

-kiniwih426

iii i don't need help but here

Answers

Answer:

please stop posting some nonsense questions this is only make if there's a problem in your module or test

Explanation:

Please stop it

Where is the question

The memory address that is saved by the system when a method is called and is the location to which the system should return after a method ends is known as the ________.

Answers

Answer:

Return point

Explanation:

Raina is putting finishing touches on her ph. D. Thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?.

Answers

Raina can emphasize the keywords throughout the thesis by: Changing font size, style, and color of the keywords.

A word processor can be defined as a processing software application that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

In Computers and Technology, some examples of a word processor include:

Microsoft WordNotepadSublime text

In this scenario, Raina should use the word processor to emphasize the keywords throughout the thesis by doing the following:

1. Changing font size.

2. Changing font style.

3. Changing font color for the keywords only.

For example, this formatting method is usually adopted by most expert tutors while answering questions on Brainly.

Read more on word processor here: https://brainly.com/question/24043728

Where can you search and download office templates?

Answers

Select file>new to start a new document select a template or use the search box to find alternatives!

To participate in a video conference, what additional equipment do you need attached to your computer

Answers

Answer:

you need a mic, and head phones

Explanation:

you need a mic so you may speak with others, and headphones to hear them and so you wont distrub others

Write a method called distance that (1) accepts four integer coordinates: x1, y1, x2, y2 as parameters, (2) computes the distance between points (x1, y1) and (x2, y2) on the map, and (3) returns that distance.


The equation for the distance is: sqrt ((x2 - x1)2 + (y2 - y1)2).


Test out your program by writing a main method that calls the distance method for each of the following pairs of cities. Your main method should output the value returned by the distance method.


Distance from Baltimare to Manehattan =

Distance from Los Pegasus to Neighagra Falls =

Distance from the Badlands to Ponyville =


in python

Answers

Answer:

import math

def distance(x1, y1, x2, y2):

 return sqrt( (x2-x1)*2 + (y2-y1)*2 )

What do you call applying and reconciling updates from various copies of a database with the master copy

Answers

Data can be replicated in different ways. The act of applying and reconciling updates from various copies of a database with the master copy is called synchronization.

Database synchronization is simply known as the ways of keeping data steadily between two or more databases. It is known to have all round spontaneous copying.

Data synchronization is therefore known as the synchronizing of data between two or more devices and keeping up with the new updates immediately between them to keep consistency within systems.

Conclusively, with synchronization, one can have all copies of data and their updates.

Learn more about synchronization from

https://brainly.com/question/25541016

which data validation alert style should you use to prevent the user from entering invalid data?

Answers

Answer:

stop

Explanation:

If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.

You understand the different standards around cabling and how to terminate your own Ethernet cables. Let’s discuss the pros and cons of making your own cables versus buying premade cables.

Answers

Answer:

hi

Explanation:

because I am new gggg and I will be

Storage that is wiped clean when power is cut off from a device is known as _____. Question 24 options:

Answers

Answer:

Volatile memory

Explanation:

Storage that is wiped clean when power is cut off from a device is known as votatile memory

one security component that doubles as a network component

Answers

Answer:

is the sentence above the question?

Answer:

It is to enter the site and then it will protect you in terms of form and appearance, and so on as required

the term information technology was first used what year?

Answers

Answer:

1958

Explanation:

The term was first published in the 1958 Harvard Business Review when authors Harold J. Leavitt and Thomas C. Whisler said “the new technology does not yet have a single established name. We shall call it Information Technology.”

Answer:

your answer would be 1985

Explanation:  "The term information technology in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Harold J. Leavitt and Thomas L. Whisler commented that "the new technology does not yet have a single established name. We shall call it information technology "

when does iron most likely to develop rust on it ​

Answers

Iron is most likely to develop rust when exposed to oxygen and water. It can be developed within a few hours or a few days.

1/10
? Assessment
Why is a Quality Assurance tester needed on a software development team?
None of the above
They test the game to make sure that
the instructions make sense and that
there are no problems.
They are needed because they test
the game and come up with new
ideas for the plot and creative
solutions to gameplay.
They are able to make sure that the
game will be really interesting to users
and unlike any game they've played
before
ננס
Do

Answers

Answer: B

Explanation: They test the game to make sure that

the instructions make sense and that

there are no problems.

A gap or weakness in a security program that allows a threat to find a way into the system is called a

Answers

vulnerability

hope this helped <3

Which document would be best created using Word Online?ANIMATIONGRAPHRESUMESPREADSHEET

Answers

Answer:

resume

Explanation:

Printed on paper, how many pages of ones and zeros would it take to print the contents of a 16GB of memory from a device, such as a phone

Answers

Printed on paper 31364861.55354 pages of ones and zeros are required to print the contents of a 16GB memory.

To know how many pages of zeros and ones are needed to print the content of a 16GB memory, it is necessary to take into account that each bit is equivalent to a character, that is, a one or a zero.

Additionally, you have to know how many bits are 16GB equivalent.

16GB equals 128000000000bits

Later you have to know how many characters (bits) fit on a page, which are 4081 characters.

So, we divide 128000000000 into 4081

128000000000bits / 4081 = 31364861.55354

According to the above, 31364861,55354 pages are needed to print the content of a 16GB memory.

Learn more in: https://brainly.com/question/2545808

CUAL ES LA FUNCION EN LA TECNOLOGIA ACTUAL, DE LAS TARJETAS DE DESARROLLO?

Answers

Las tarjetas de desarrollo juegan un papel fundamental en la tecnología actual, ya que son capaces de brindar seguridad y confidencialidad a la información contenida en la memoria, haciendo que los procesos sociales y organizacionales sean más sencillos y seguros.

Un circuito integrado de tarjeta es capaz de actuar como microprocesador, donde se ejecuta la lógica programada, con diversas aplicaciones como:

Tarjetas de control de accesoTarjetas de identificación de alta seguridadTarjeta de crédito

Por tanto, las tarjetas de desarrollo son capaces de almacenar información y proteger datos mediante cifrado, siendo un recurso que combina funcionalidad y seguridad para diversas capacidades técnicas y aplicaciones.

Aprende más aqui:

https://brainly.com/question/10571894

A(n) ____________________ is a special character that can stand for any other character or, in some cases, a group of characters.

Answers

The answer is wildcard

A design exhibits __________ when it uses newer styles in modern browsers while displaying a usable layout and all page content in older browsers.

Answers

Answer:

graceful degradation

Explanation:

Write the function prototype for a void function named getSquare. It should accept a pointer to an integer as an argument.

Answers

Answer:

void getSquare(int*);

Explanation:

The void is because it does not return a value.

Next is the name of the function "getSquare".

Then inside the ( ) you add the data types you want the function to accept, in this case its int*.

Finally you end with a ; because it is a function prototype.

When is it appropriate to restore from a system image?

Answers

Answer:

When should I use system image Recovery?  

As long as you have created a system image of your hard disk, you can use the System Image Recovery tool from the Recovery Drive to restore your entire system in the event of a hard disk failure.

Explanation:

Other Questions
I need answer to #1 The final battle of the pacific war was fought? What is more important in influencing who your character has become: his surroundings, which he has no control over, or the choices he makes? Explain, using references (from the book, a/k/a text evidence) to setting, character, and plot. The novel is called, Piecing Me Together. Jus search it up and reword it pls. thx. The excerpt best reflects which of the following historical situations in the early 1800s?. here did most Africans work after they were brought to Virginia?in gold minesin tobacco fieldsin craft shopsin the military What is the purpose of multimedia in a presentation? 25 POINTS!!!!!!!!!!!!!When search engines republish content, it refers to _____.A. a passive digital footprintB. a leaking data exhaustC. an active digital footprintD. an active data exhaust Will be giving out the brainlyist to the person to get it corectly. What is the topic of a piece of informational writing? (1 point)A. the meanings of words B. the way information is groupedC. the subject or focusD. the way the writer feels about the subject i chose topic twoReview the document associated with the topic you chose: Topic 1: The Emancipation Proclamation Topic 2: The Gettysburg Address Based on your research, what is the importance and meaning of the document? In 3-4 paragraphs, discuss the significance of the document to the war and how it has affected the United States. Use the following sources for background information: Information on the Emancipation Proclamation Information on the Gettysburg Address Your response should include these ideas: Summarize the background of the document or speech: What events led to it? Why was it needed at that specific time? What was its purpose? Summarize the content of the document or speech: What did it say? Summarize its effects: How did people react to it? How did it affect future events? How did it affect peoples attitudes? Summarize how the document or speech is seen now, many years later: Is it still considered important? Why? what is slope intercept form of a line? how many valence electrons does the neon family have !Can SOMEONE HELP ME! PLEAsE!!!!!!!Which one of these words should be in that little space?1. Noun 2. verb3. adverb4. adjective What is the goal of a missionary?To convert people to their religionTo make money for their countryTo set up cash crop plantationsTo seek out gold in the Americas (Ill give brainliest) Can someoneplease help me with this math vocab!? Please help will mark brainliest!!! Pls quick! I need help Help ASAP 17 Points Which sentence correctly uses one or more commas to set off a nonrestrictive clause? A. The map, which was too faded to read revealed the location of the treasure. B. The book which is a best seller, is at the top of my to-read list. C. My sister, who just got her driver's license, was late to pick me up. D. Brady asked Keenan who is his best friend to help him study for the test. Select the correct answer.Why did Osama bin Laden leave his home country of Saudi Arabia for Afghanistan?O A.He wanted to help the Soviets in their fight against US forces.O B.He wanted to help rebuild the government there after the Soviets invaded.O C.He wanted to help other Muslims fight against the Soviet occupation.O D.He wanted to create his own Afghan government, the Taliban. Eva took a taxi from her house to the airport. The taxi company charged a pic of feet of 3 dollars and 20 cents, plus 3 dollars per mile. The total fare was 33 dollars and 20 cents, including the tip, which equation or tape diagram could be used to represent the context x represents the number of miles in a taxi ride.