1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
7

What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?

If you click within the window, you may unknowingly agree to install malware.
Computers and Technology
2 answers:
IgorC [24]3 years ago
7 0

Answer:

Pop-up download

Explanation:

A pop-up download occurs when a user is on a web page and a pop-up window shows that asks the user to download a program to their computer, It is mostly used to install malware that monitors the user online behavior and reports back to the spyware company.

Georgia [21]3 years ago
6 0

Answer:

download pop-up

Explanation:

Download pop-up (otherwise known as pop-up download) is an alert, modal or pop-up window that prompts a user to download a particular program. This program might be a malware. So once clicked, the program may automatically install on the user's computer. Since the program might be a malware, installing such on the user's computer will cause the computer to misbehave. The malware might steal, corrupt or damage files or data on the computer system.

You might be interested in
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that su
viktelen [127]

Answer:

The correct answer to the following question will be option C.

172.16.80.1-172.16.87.254

Explanation:

IP Address: IP Address stands for Internet Protocol Address, a unique numerical label allotted to every computer network that are connected to the network of the computer and communicate through the internet protocol.

  • An IP address can be separated by periods and having four numbers that are called Octet. Range of IP address can be from 0 to 255.
  • We have to keep the first 21 bits and start setting all from the 22nd bit on to 0 (zero).
  • To get the suitable and the correct range of the address, we add and subtract 1 from the given broadcast address i.e.,172.16.85.0/21.

So, option C is the right answer and no other option is usable according to the given explanation and the address given by the administrator.

3 0
3 years ago
mr. Jones put the same amount of soil around each of the five plants he has six bags of soil how many bags of potting soil did m
jarptica [38.1K]
Mr. Jones put 1.2 bags of potting soul around each tree. To solve this problem divide the number of bags by the number of plants.

Hope this helps!
4 0
3 years ago
Focusing on the general characteristics of a problem or object, while ignoring the details, is a technique called
Taya2010 [7]

Answer:

Abstraction

Explanation:

In computer science, abstraction has a similar definition. It is a simplified version of something technical, such as a function or an object in a program. The goal of "abstracting" data is to reduce complexity by removing unnecessary information. At some level, we all think of computers in abstract terms.

5 0
3 years ago
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
Other questions:
  • You work administrative assistant in an engineering firm. A co-worker constantly makes fun of the engineers by whispering commen
    13·1 answer
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • For your new sporting goods store, you originally planned to only sell Nike shoes. Therefore, you only had enough shoe displays
    11·2 answers
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • Digital art is created by using __?
    5·1 answer
  • Does anyone know the point of gradpoint?
    8·1 answer
  • Why do we need vram​
    6·1 answer
  • Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program h
    12·1 answer
  • Please Helpppp Me User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all t
    8·1 answer
  • Do you think it's easier to be mean online than offline? why?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!