<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
        
             
        
        
        
Answer:
A
Explanation:
because when you make a presentation so you are already use technology
 
        
             
        
        
        
Answer:
step 1: sign up for an intune account
step 2: create intune user accounts
step 3: define intune policies
step 4: enroll mobile devices
step 5: link mobile devices to users.
Explanation:
The Microsoft Windows intune is a Microsoft cloud-based service that provides a central cloud service for all subscribed and linked devices. It provides a sense of security of data resource and tracking of device activities.
A company subscribes to intune to allow the use of both cooperate and BYOD (bring your own device to work), to access data. First, the administrator sign up and create the intune account, then defined the intune security policies. Then it enrolls the individual devices and links them to their respective users.
 
        
             
        
        
        
Maybe in atosave, Computers mostly save what your working on :3