1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
13

A downloaded executable file may contain harmful software known as

Computers and Technology
2 answers:
mylen [45]3 years ago
8 0

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

djyliett [7]3 years ago
3 0

A downloaded executable file may contain harmful software known as malware.

Further Explanation:

Malware: Malware is a file or program that is harmful for the computer system. Malware has various types which include viruses, Trojan horses, worms and spyware. These are mostly downloads over the internet either by click on the malicious link or through email. The purpose of these programs are deleting or stealing sensitive data, hijacking the computer programs or monitoring the computer users without their permission.  

Phishing attack is one of the malware activities where attackers send malicious link or attachment through attachment to hijack the computer’s core functionality. In this case, computer user thinks that it is legitimate message but actually it is malicious. Other malware attack done over the internet is drive by download where malicious program automatically download to the system without taking permission from the user.

The main types of malware are listed below:

  • Virus
  • Worm
  • Trojan horse
  • Spyware
  • Ransomware
  • Rootkit
  • Adware
  • Keyloggers

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Computer Engineering
  • Subject: Information Security
  • Chapter: Malware

Keyword:

Malware, virus, worm, Trojan horse, spyware, downloaded, executable, file, harmful, software, key loggers, adware, ransomware,phishing attack, drive by download

You might be interested in
In which of the following situations is it probably better to use a fixed-size array over another more flexible option, like Arr
ddd [48]
D) a situation where you don’t know....
7 0
3 years ago
What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
mars1129 [50]
I think its the ruler c
7 0
3 years ago
Read 2 more answers
Which of these is a Microsoft certification for system engineers
kow [346]

Answer: B. MCSE

Explanation:

Microsoft offers various courses and certifications for different careers in the IT industry. One such career is system engineering where the MCSE which stands for Microsoft Certified Solutions Expert is offered.

This certification proves that one is proficient with technologies such as server infrastructure, data platforms and business intelligence. Prospective careers apart from sound engineering include Network management and Database Analysis.

7 0
3 years ago
Which ipsec subprotocol provides data encryption?
Mrac [35]
I'm not sure but I think LastPass?
6 0
4 years ago
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
4 years ago
Read 2 more answers
Other questions:
  • In steps<br> Urgent please
    14·1 answer
  • Write a function (funception) that takes in another function func_a and a number start and returns a function (func_b) that will
    7·1 answer
  • Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manne
    12·1 answer
  • Real GDP is found by removing the effects of inflation. How is this done mathematically?
    5·1 answer
  • you want to enhance your Website visitors' experience. To do this, you need to know the type of browser that each visitor to you
    11·1 answer
  • A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to mul
    8·1 answer
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • Construct pseudocode for a program that prints ‘Hello World’ on the screen.
    7·2 answers
  • Given the 32-bit binary number:
    13·1 answer
  • 1.Blocul care asigura impedanta necesara la intrarea aparatului de masurat numeric este:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!