1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
4 years ago
7

What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?

If you click within the window, you may unknowingly agree to install malware.
Computers and Technology
2 answers:
IgorC [24]4 years ago
7 0

Answer:

Pop-up download

Explanation:

A pop-up download occurs when a user is on a web page and a pop-up window shows that asks the user to download a program to their computer, It is mostly used to install malware that monitors the user online behavior and reports back to the spyware company.

Georgia [21]4 years ago
6 0

Answer:

download pop-up

Explanation:

Download pop-up (otherwise known as pop-up download) is an alert, modal or pop-up window that prompts a user to download a particular program. This program might be a malware. So once clicked, the program may automatically install on the user's computer. Since the program might be a malware, installing such on the user's computer will cause the computer to misbehave. The malware might steal, corrupt or damage files or data on the computer system.

You might be interested in
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
What are two tasks that need to be done to a hard drive before operations can use it
Montano1993 [528]
First insert the harddrive then go to computer (the program) and click on hard drive.  :)
3 0
3 years ago
Add me as a friend on Real pool 3D so we can play a round of pool!!!
Sloan [31]

I will but i have to wait till after 3;00 will you still be online by then. If not you can just friend me and message me when you are today

8 0
3 years ago
3 uses for auto formatting
zalisa [80]
Auto formatting is a computer software feature that automatically change the appearance of texts. Uses of auto formatting include the following:
it can be used to quickly apply or change automatic formatting.
It can be used to give a professional look to a document with minimal efforts.
the internet and network hyperlink option can be used to format email addresses and URL as clickable hyper link fields. 
The border line option can be used to apply paragraphs border styles to one's documents.
The table option can be used to create a table. 

3 0
3 years ago
Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
madam [21]

Answer:

           while (Num>=0) {

               System.out.println("enter a another number");

               Num = in.nextInt();

           }

Explanation:

The complete java code prompting a user to enter a number until a negative number is entered is given below:

import java.util.Scanner;

public class num6 {

public static void main (String [] args) {

Scanner in = new Scanner(System.in);

System.out.println("enter a number");

int Num = in.nextInt();

while (Num>=0) {

System.out.println("enter a another number");

Num = in.nextInt();

}

System.out.println("Done.");

return;

}

}

3 0
4 years ago
Other questions:
  • Blender questions
    8·2 answers
  • Annabeth has been using a public cloud to store and access her documents. Which drawback of a public cloud should she be aware o
    11·1 answer
  • Which spereadsheet type will determine<br> how well a bussiness has done over the past year
    11·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • Heeeaaaalp please!!!!
    15·2 answers
  • How to make a Tip Calculator in code?
    12·1 answer
  • Please help me please help me.​
    10·1 answer
  • What does a production proposal provide ?
    7·2 answers
  • Have a good christmas. this might not be homework, but i just want everyone to have a good week
    6·2 answers
  • Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!