1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
13

A downloaded executable file may contain harmful software known as

Computers and Technology
2 answers:
mylen [45]3 years ago
8 0

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

djyliett [7]3 years ago
3 0

A downloaded executable file may contain harmful software known as malware.

Further Explanation:

Malware: Malware is a file or program that is harmful for the computer system. Malware has various types which include viruses, Trojan horses, worms and spyware. These are mostly downloads over the internet either by click on the malicious link or through email. The purpose of these programs are deleting or stealing sensitive data, hijacking the computer programs or monitoring the computer users without their permission.  

Phishing attack is one of the malware activities where attackers send malicious link or attachment through attachment to hijack the computer’s core functionality. In this case, computer user thinks that it is legitimate message but actually it is malicious. Other malware attack done over the internet is drive by download where malicious program automatically download to the system without taking permission from the user.

The main types of malware are listed below:

  • Virus
  • Worm
  • Trojan horse
  • Spyware
  • Ransomware
  • Rootkit
  • Adware
  • Keyloggers

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Computer Engineering
  • Subject: Information Security
  • Chapter: Malware

Keyword:

Malware, virus, worm, Trojan horse, spyware, downloaded, executable, file, harmful, software, key loggers, adware, ransomware,phishing attack, drive by download

You might be interested in
To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the _____ fe
Lera25 [3.4K]

To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the FIRST LINE INDENT.

<h2>Your answer would be B. First Line Indent</h2><h3><u><em>hope this helps</em></u></h3>
4 0
3 years ago
Read 2 more answers
If a class has member variables that are pointers, you must ensure that you implement ____.
DedPeter [7]

Answer:

objects

Explanation:

pointer are used for the objects

5 0
3 years ago
In addition to explaining the paper’s topic, a thesis statement provides instructions on how to read the paper. explains why the
tamaranim1 [39]

Answer: I believe it’s explains why the paper was written!

Explanation:

Took edge 2021

8 0
3 years ago
Read 2 more answers
Which best describes how information is sent on the internet?
V125BC [204]

Answer:

a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are

Explanation:

8 0
2 years ago
Please choose the correct citation for the case which established the "minimum contacts" test for a court’s jurisdiction in a ca
IRINA_888 [86]
Beep boop celery fart
6 0
3 years ago
Other questions:
  • Web storage stores data in the browser in
    5·1 answer
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • What is the left are if a slide in a presentation called
    15·1 answer
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • What is a custom information field that helps users to find a specific document?
    8·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • What are minimum computer requirements for a software program?
    5·1 answer
  • How does recorded audio stay on an audio tape
    12·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!