1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
2 years ago
13

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or scre

en saver.
Computers and Technology
1 answer:
Lady_Fox [76]2 years ago
4 0

Answer:

Trojan horses

Explanation:

You might be interested in
Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
neonofarm [45]

Answer:

b location based services

Explanation:

:)

4 0
3 years ago
It's best to use assertive speech when you<br> I want to show respect. *<br> True<br> False
mestny [16]

Answer:

True

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
How was WiFi discovered?
postnew [5]

Answer:

An Australian scientist by the name of John O'Sullivan was inspired by Stephen Hawking's theory of evaporating black holes and their subsequent radio waves. He set out to find them and prove the theory correct. (Wi-Fi was discovered on accident)

7 0
3 years ago
Pedro would like to create a computer program to add two numbers. The commands for the algorithm he created are:
Usimov [2.4K]
Press the equal number.

For example:
Press the equal button: = (this step can go first or last)
Enter the first number: 5
Press the addition button: +
Enter the second number: 4
Press the equal button: =
3 0
3 years ago
When you use the ip address of the web server, the correct site is displayed?
jekas [21]
No. Using the address will get you either the default site, or the first site declared. Web servers can host VirtualHosts, and rely on the site name to know which VirtualHost to serve. TMI, it's called name based virtual host, as opposed to the machine having many addresses then address based virtual hosts can be created.
6 0
4 years ago
Other questions:
  • The _____ text wrapping option wraps text around the object, with the text forming to the shape of the object.
    14·1 answer
  • Which education level has the highest return on investment (ROI)?
    14·1 answer
  • What is the drawback of the linear model?
    5·2 answers
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    9·1 answer
  • Hey guys I have a quick question about computer science I WILL MARK BRAINLIEST (crown )
    6·2 answers
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • Which of the following allows you to copy
    15·1 answer
  • A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spr
    6·1 answer
  • Which native windows application allows you to access basic pc settings and controls such as system information, controlling use
    7·1 answer
  • Help debugging line 7 type error more arguments (5) than expected (1)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!