1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
2 years ago
8

what is the name of the virus that appears to be a legitimate program but when opened, it can steal passwords or destroy data?

Computers and Technology
1 answer:
nikdorinn [45]2 years ago
4 0

Answer: A Trojan Horse

Explanation: The name is based on the famous legend, where an army was granted access under the guise of being a safe and trustworthy entity.

You might be interested in
How do you fix peer answer bad gateway 502. Please help
kondaur [170]

Answer:

Reload the page.

Look for server connectivity issues.

Check for any DNS changes.

Sift through your logs.

Fix faulty firewall configurations.

Comb through your website's code to find bugs.

Contact your host.

Explanation:

7 0
3 years ago
Who was the first person in 1983 to offer a definition of the term computer virus
Simora [160]

Answer:

Fred Cohen

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in
Gekata [30.6K]
Wi-Fi is the anwser.Hope I helped.
7 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
3 years ago
We have noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n
Ostrovityanka [42]

Consider the given data:

Assume packet length=n

Maximum queuing delay= (n–1)D

All packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports.

a)  The maximum delay for a packet for the memory = (n-1)D

b)  The maximum delay for a packet for the bus = (n-1)D

c)  The maximum delay for a packet for the crossbar switching fabrics=  0

7 0
3 years ago
Other questions:
  • Clicking the _____ box completes an entry. cancel formula enter tab
    15·1 answer
  • Which of the following is true of property?
    13·1 answer
  • With network management software, a network manager can ____.
    6·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • What is the name used for the camera s view from a single position?
    9·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • Just answer in five-line. Question:
    9·1 answer
  • "which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without th
    7·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!