1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
1 year ago
6

Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa

y a fee to unlock them?
A. hacking

B. ransomware

C. phishing
Computers and Technology
1 answer:
gladu [14]1 year ago
4 0

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

You might be interested in
You are given a class named Clock that has three instance variables: One of type int called hours, another of type boolean calle
Ivahew [28]

Answer:

Clock (int hours, boolean isTicking, int diff) // constructor clock

{

this.hours = hours;

// set the instance variable hours

this.isTicking = isTicking;

// set the boolean variable isTicking

this.diff =diff;

//set the instance variable diff

}

Explanation:

Here we declared a constructor clock which has 3 parameter hours,boolean isTicking,and diff.

The int hours, diff is of int type and isTicking is of boolean type. In this constructor, we set the instance variables values by using this keyword.

5 0
3 years ago
It is a good programming practice to ________ your functions by writing comments that describe what they do.
AleksandrR [38]
It is a good programming practice to explain your functions by writing comments that describe what they do.
7 0
3 years ago
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ____ key.
AVprozaik [17]
To erase an entire entry in an excel cell and then reenter the data from the beginning, press the ESC key. ESC stands for <span>Escape.
</span>The escape key is found <span>on most computer keyboards.  When the ESC key is presses t</span>hen the escape command is sent from the keyboard to a computer and this command o is interpreted by software as "stop". So, it is used to stop some actions.
5 0
3 years ago
Which of the following would a cyber criminal most likely do once they gained access to a user id and password
Bogdan [553]

Answer:

do something wrong as you

3 0
2 years ago
What is the full form of MPEG?<br> The full form for MPEG is ________.
SVEN [57.7K]

Answer:

Moving Picture Experts Group

Explanation:

5 0
1 year ago
Other questions:
  • When a browser makes a request for a static web page, the web server a. finds the HTML for the page and renders it b. renders th
    11·1 answer
  • What are voter purges
    11·1 answer
  • An Oven Is Just A Spicy Refrigerator? Yes Or No??
    9·2 answers
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
    8·1 answer
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
  • Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
    9·1 answer
  • Activity Sheet 2<br>A.Illustrate how to create the object below using draw and modify commands.​
    15·1 answer
  • When you save a presentation with a .potx file extension, which type of powerpoint file is created?
    8·1 answer
  • The _________________ creates international guiding principles for computer forensic examiners.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!