1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
13

A downloaded executable file may contain harmful software known as

Computers and Technology
2 answers:
mylen [45]3 years ago
8 0

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

djyliett [7]3 years ago
3 0

A downloaded executable file may contain harmful software known as malware.

Further Explanation:

Malware: Malware is a file or program that is harmful for the computer system. Malware has various types which include viruses, Trojan horses, worms and spyware. These are mostly downloads over the internet either by click on the malicious link or through email. The purpose of these programs are deleting or stealing sensitive data, hijacking the computer programs or monitoring the computer users without their permission.  

Phishing attack is one of the malware activities where attackers send malicious link or attachment through attachment to hijack the computer’s core functionality. In this case, computer user thinks that it is legitimate message but actually it is malicious. Other malware attack done over the internet is drive by download where malicious program automatically download to the system without taking permission from the user.

The main types of malware are listed below:

  • Virus
  • Worm
  • Trojan horse
  • Spyware
  • Ransomware
  • Rootkit
  • Adware
  • Keyloggers

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Computer Engineering
  • Subject: Information Security
  • Chapter: Malware

Keyword:

Malware, virus, worm, Trojan horse, spyware, downloaded, executable, file, harmful, software, key loggers, adware, ransomware,phishing attack, drive by download

You might be interested in
What are some of the visual clues a defensive driver can use to spot a impaired driver
Margaret [11]

Excessively low or high speed.

Inconsistent speed.

Swerving side to side or crossing the center line.

Failing to obey traffic signs or signals.

Getting out of the car at 40+ mph.

5 0
4 years ago
Read 2 more answers
public static String[] strArrMethod(String[] arr) { String[] result = new String[arr.length]; for (int j = 0; j < arr.length;
faust18 [17]

Answer:

answer is 24

Explanation:

hope this helps

7 0
3 years ago
Why is fluency in information technology becoming increasingly important for many college majors?
never [62]
I think the answer to your question is opt. D
5 0
3 years ago
Read 2 more answers
What is a sending device? a device on which data, instructions, and information travel a device that accepts the transmission of
DENIUS [597]
<span>What is a sending device? </span>
A sending device is a device that initiates an instruction to transmit data, instructions or information.

8 0
3 years ago
What mode is generally used when delivering a presentation to an audience?
dybincka [34]

Answer:

delivery mode

Explanation:

there it is

7 0
3 years ago
Read 2 more answers
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • Cattell classified projective tests, such as the rorschach inkblot test, as:
    13·1 answer
  • Privacy concerns, financial information, security of your personal data has
    14·1 answer
  • What is Blender's default save directory for movie AVI files?
    9·2 answers
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • The blank is the area on your screen where you can access the tab and menu options for word
    5·1 answer
  • Which of the following is not an example of debugging? looking for errors in programming code. fixing misspelled commands in pro
    13·1 answer
  • Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
    10·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • Which example best demonstrates an impact of computers on health care?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!