1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
1 year ago
12

What type of malicious software technology is used to download and install software without the user's interaction?

Computers and Technology
1 answer:
Mnenie [13.5K]1 year ago
8 0

Answer:Auto Download Software

Explanation:

Auto Download Software is a software technology which downloads and installs software without the user's interaction

You might be interested in
Why might you need to convert a file to another file type
Alex17521 [72]
This depends on what program you're using. Some programs can only read certain files exclusive to that program, such as .psd files can usually only be read in Photoshop or other adobe programs. Many fields of work (Journalism, the Arts, Design, etc.) ask for .psd files to be converted to either .png, .jpg, or .tiff so that it can be seen on many other platforms.

For images especially, files are more compatible either on a program or printed. for example, .png files are good for storing color data from computer to computer, but if you print a .png file, the quality is poor. hence it's recommended to save files you want to print for designs as .jpeg, because .jpeg can more easily be printed and will then be presented at a high quality.

Sometimes color quality changes depending on CMYK as well but that's a whole other ball of wax.
8 0
3 years ago
FREE BRAINLIEST!!!
Nastasia [14]

Answer:

B

Explanation:

4 0
3 years ago
Read 2 more answers
CODING TIME
Fynjy0 [20]

Answer:

food_list = ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

one_more = ['meat']

extend_list = food_list + one_more

print(extend_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'meat']

food_list.append('milk')

print(food_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'milk']

food_list.insert(0, 'cake')

print(food_list)

Output : ['cake', 'rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

flowers = ['rose', 'hibiscus', 'lily']

flowers.remove('rose')

print(flowers)

Output : ['hibiscus', 'lily']

To remove rose using pop()

flowers.pop(0)

Explanation:

The + operator and append method adds elements to the end of an existing list item.

The insert method adds element at the specified index

Remove method deletes element by stating the name of the element to be deleted while pop deletes element using the index value of the element.

7 0
3 years ago
When working in Excel Online, you decide that the data in column C is not needed at the current time but might be useful later.
attashe74 [19]
C. Hide

Good luck :)
8 0
3 years ago
Read 2 more answers
what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?
Bad White [126]

people mark the people who answered their question probably because they were asked to or their answer was what they were looking for and it helped them. and i don't know why people want it so bad, but personally for me i like getting brainliest because i guess it makes me look cool lol. also it's easy, to give brainliest, when you see a crown that's where you mark brainliest. but sometimes brainly doesn't show the crown i don't understand why, but it happens for some people including me.

8 0
3 years ago
Other questions:
  • Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
    14·1 answer
  • What is the difference between an embedded image and an attached image
    7·2 answers
  • When creating a firewall exception, what is the difference between opening a port and allowing an application through?
    7·1 answer
  • BI is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies. b. BI i
    10·1 answer
  • What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum > 4) break; } whi
    8·2 answers
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • Valerie regularly generates sales reports from her organization's data warehouse. She uses these reports to create presentations
    5·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    6·1 answer
  • What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!