Answer: trojan horse virus
Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's
personal information like password information, or they may simply use it to destroy programs or data on the hard disk.
Answer:
Eddy current inspection
Explanation:
According to my research on nondestructive testing methods, I can say that based on the information provided within the question the method being described is called Eddy current inspection. This is a method that uses electromagnetic induction to detect and characterize surface and sub-surface flaws in conductive materials
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
It’s either presentation Because the software is used to create a sequence of texting, graphics and often audio and video to accompany a speech or a public presentation, or letter
The need to strike is purposely to create unity and equal rights for what a group might feel is unfair .