1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
11

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer w

orks without the userâs knowledge or permission.
Computers and Technology
1 answer:
Leviafan [203]3 years ago
5 0
Virus










-----------------------------------
You might be interested in
A binary search algorithm ____________ an ordered list in<br> half to find an item.
mel-nik [20]

Answer:

Binary search works on sorted arrays. Binary search begins by comparing an element in the middle of the array with the target value. If the target value matches the element, its position in the array is returned. If the target value is less than the element, the search continues in the lower half of the array.

Explanation:

4 0
3 years ago
Sometimes you're the dog, sometimes the fire hydrant, your thoughts?
yulyashka [42]
Sometimes your mean to people (dog peeing on fire hydrant) sometimes people are mean to you (being peed on)
8 0
3 years ago
For electronically deposited funds, such as an employee's direct deposit, when must banks make those funds available to the empl
Kazeer [188]
I'm in computers class and I would say
6 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
What is the purpose of the literature review section of research paper
navik [9.2K]

variation of colored sediment

5 0
3 years ago
Other questions:
  • The collodion process was significantly more expensive than the cost of a daguerreotype
    10·1 answer
  • Which of the following statements about the FAFSA process are TRUE?
    6·1 answer
  • Never mind I got it
    8·2 answers
  • One of the advantages of off-the-shelf software is that ________________. a. the software contains important features, thus elim
    13·1 answer
  • Make me die from laughter i will give brainlyest for the best joke
    11·1 answer
  • Number are stored and transmitted inside a computer in the form of​
    6·1 answer
  • QUICK HELP ME PLEASE
    9·1 answer
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
  • What is a good theme statement for the short Pixar film "bao"?
    10·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!