1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
11

A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d

isaster, such as shutting the system down or destroying files. a. logic bomb b. salami slicing c. Trojan horse d. back door
Computers and Technology
1 answer:
tatyana61 [14]3 years ago
8 0

A computer abuse technique called a logic bomb involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.

<h3><u>Explanation:</u></h3>

Logic bombs are the set of commands that are embedded in a program and has some undesirable and harmful effects when some of the mentioned conditions are fulfilled. When the condition is satisfied logically, this program will begins get executed thereby affecting the computer system in an undesirable way.

These are considered to be a Malware that begins the tasks that it incorporated in it when the logical conditions are satisfied. It is kind of break that occurs in a system in which it is triggered to be executed and attacks it automatically when certain conditions are met.  

You might be interested in
What term refers to mathematical equations used in Excel to perform calculations?
vovikov84 [41]

Formulas is the BEST answer to your question.

4 0
2 years ago
Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
timofeeve [1]

Operating systems are the software that supports the basic functioning of the computer. Windows Virtual Desktop is an Azure compute service that will help solve the problem.

<h3>What is Windows Virtual Desktop?</h3>

Windows Virtual Desktop is an app virtualization service of Azure that operates on the cloud platform. It includes standard operating procedures that can be used by users with multiple OS.

Azure's Virtual Desktop supports different versions of window OS. This type of system is majorly used in remote work demands and specialized workloads.

Therefore, Windows Virtual Desktop is an Azure compute service.

Learn more about Azures service here:

brainly.com/question/13144160

#SPJ1

5 0
1 year ago
What is metrical task system algorithm?? and can we use that in online shopping project??
jeyben [28]

Answer:

Metrical task system algorithm is the online algorithm that is used for organizing the online problems like k-server issues, paging issues etc.This task system works in the form of metrics to decrease the complete cost  experienced due to processing of the operation and analyzing the competition.

It can be used for the online shopping project for the analyzing the comparison between the performance on basis of online and offline trends and then optimization can take place according to the the results.

7 0
3 years ago
Which option is the easiest way to configure macros in Access 2016?
zhuklara [117]
Number 2
Have a nice day
6 0
3 years ago
AFLAC, Inc. recently implemented a company policy that all new IT projects must be coordinated and approved by the project manag
Shkiper50 [21]

Answer:

Option (E) is the correct answer to the following question.

Explanation:

Because it helps AFLAC Inc. company to run their project in a more easier way and it also helps its employees to work fast on their new IT projects by installing a WiFi network in their ALFAC inc. branch office. So, that's why they have to install a wireless network.

And the other option is not applied because these activities have to be done in all projects if the project is important either not.

8 0
3 years ago
Other questions:
  • Identify the modern-day printmaking process, also known as screenprinting, in which the artist squeegees paint through a mesh sc
    15·1 answer
  • The mods have peanuts for brains (it's true, I lost like 1k points to them for no reason)
    12·1 answer
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • What is the value of variable num after the following code segment is executed?
    5·1 answer
  • Windows displays a(n)
    11·1 answer
  • I want to sign up for brainly but it won't let me. It keeps saying "we can complete your registration at this time".
    13·1 answer
  • Public static double secret(int first, double second)
    6·1 answer
  • Identify what a computer needs to
    14·1 answer
  • Icon view, list view, and details view are all common views provided by which kind of program?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!