1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
4 years ago
10

Which of the following is not an example malicious code A.Trojan horse B.worm C.virus D.spygear

Computers and Technology
2 answers:
umka21 [38]4 years ago
7 0
B would be the correct answer

nignag [31]4 years ago
5 0
Spygear because that removes viruses, not give them.
You might be interested in
Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
vladimir1956 [14]
Hey How are you fine?
3 0
4 years ago
What is the key function of a Scrum Master?
Reptile [31]

Answer:

The scrum master is the team role responsible for ensuring the team lives agile values and principles and follows the processes and practices that the team agreed they would use. The responsibilities of this role include: Clearing obstacles. Establishing an environment where the team can be effective.

Explanation:

8 0
4 years ago
What other identifiers would you need to alter in a cloned virtual machine to be sure it was unique? What might happen if these
Romashka [77]

Answer:

Following identifiers needs to be altered in cloned VM.

  1. Changing the IP address
  2. Selecting Ethernet Ports
  3. Rename the Pointers
  4. Renaming the Second Disk Drive
  5. Host names must be unique
  6. Rename the VM name

Explanation:

When we clone the VM, we have to make sure that Cloned VM should have unique system information and network addresses in and out of guest OS.

If UUID’s of all cloned VM's are different then DHCP will get separate ip addresses for those. Suppose if the IP addresses are static or If the IP address was hardcoded then it has to be changed to new IP address manually. If this is not done then it will cause duplicate IP’s and will cause networking issues.

When Cloned VM is created then the ethernet port has to be chosen correctly to make sure that LAN networking is correct.

You should specify the disk capacity. If you choose disk capacity as single file then it will create one vmdk file. So, specify the correct disk capacity, If you did not choose the disk file as single file then you may end up having multiple .vmdk files. So in that case you need to rename the pointers of copy of vmdk files.

Rename the Second Disk Drive. For example : You may find two VM files with VM Copy.vmdk, So you have to rename second disk to VM Copy-1.vmdk or any other name.

The cloned VM copies the parent virtual machine and it also includes the VM name. To avoid problems caused by having VM's with duplicate names on the network, give the VM in the cloned VM a unique name.

You have to make sure that hostnames are different as well. Hostname resolution will lead to conflict if its same on both VM's.

7 0
4 years ago
What is ment by creative middle way solution
SOVA2 [1]
Looking for a way to resolve conflicting values that comes as close as possible to satisfying all relevant obligation
7 0
3 years ago
Lenders always accept applications for credit
LenKa [72]
The correct answer to the question that is being stated above is FALSE.

The statement is false because lenders do not always accept applications for credit. Lenders always consider credit history of the applicant. If the applicant has a good credit history background, then he qualifies.
3 0
4 years ago
Other questions:
  • Which step needs to be done before changing the font type, size, and color of a particular set of text
    7·1 answer
  • Software designed specifically for managing real estate is an example of ________ software. Select one: A. e-commerce B. vertica
    7·1 answer
  • Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________
    15·1 answer
  • What is the wave speed of a wave that has a frequency of 100 Hz and a wavelength of 0.30m?
    5·1 answer
  • A chart generated in Microsoft Excel can be plugged into a presentation authored used PowerPoint?
    8·1 answer
  • Output devices reproduce or display which of the following
    12·2 answers
  • A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most
    9·2 answers
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    12·1 answer
  • How do we add questions on sam Blockly?​
    6·1 answer
  • Which operating system is used by most the supercomputer system in the world
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!