1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
1 year ago
6

Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa

y a fee to unlock them?
A. hacking

B. ransomware

C. phishing
Computers and Technology
1 answer:
gladu [14]1 year ago
4 0

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

You might be interested in
Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
Ivan

Answer:

a, duplicate the object.

Explanation:

just took the exam on edg

5 0
3 years ago
Read 2 more answers
What might happen if dispatchable threads were removed from the software hierarchy? A. Requests from the mouse would be ignored.
Goryan [66]
So the question ask on which of the following among the choices might happen if dispatchable threads were removed from the software hierarchy and the best answer among your choices is letter D. Background program would be dropped. I hope you are satisfied with your answer 
4 0
3 years ago
How can random numbers in a range be generated in Java?.
Ksju [112]

Answer:

Java oh Na Na my  

Explanation:

5 0
2 years ago
Write a function in MATLAB that takes as an input a matrix of coefficients for a system of linear equations (A), the solution ve
Illusion [34]
Answer is A all the way to the right
7 0
3 years ago
why might a portrait be both a portrait of the subject and the photographer? how is a photographer present in a portrait?
Nataliya [291]
Because of the reflection on the window or mirror.
5 0
2 years ago
Read 2 more answers
Other questions:
  • Think back over the information presented in the lesson about how you can skillfully use the Internet when doing research. Selec
    14·1 answer
  • Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
    15·1 answer
  • Which of the following terms best describes the security domain that relates to how data is classified and valued?
    14·1 answer
  • A contracting company recently completed it's period of performance on a government contract and would like to destroy all infor
    13·1 answer
  • Which is the hanging indent on the ruler?
    10·2 answers
  • Machines may aid in making work easier over a longer distance. true or false.
    7·1 answer
  • Match each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back sc
    10·1 answer
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!