1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
11

A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d

isaster, such as shutting the system down or destroying files. a. logic bomb b. salami slicing c. Trojan horse d. back door
Computers and Technology
1 answer:
tatyana61 [14]3 years ago
8 0

A computer abuse technique called a logic bomb involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.

<h3><u>Explanation:</u></h3>

Logic bombs are the set of commands that are embedded in a program and has some undesirable and harmful effects when some of the mentioned conditions are fulfilled. When the condition is satisfied logically, this program will begins get executed thereby affecting the computer system in an undesirable way.

These are considered to be a Malware that begins the tasks that it incorporated in it when the logical conditions are satisfied. It is kind of break that occurs in a system in which it is triggered to be executed and attacks it automatically when certain conditions are met.  

You might be interested in
Which network type uses a coaxial cable to receive its signal?.
Tresset [83]
If you’re asking what I think your saying I know comcast does
6 0
2 years ago
The faster data transfer port for computer today is port
qwelly [4]

USB Type C or 3.0/3.1 is the fastest

8 0
3 years ago
(3)(6 Points) During a sale at a store, a 10% discount is applied to purchases over $10.00. Write a program that asks for the am
Galina-37 [17]
I only need point sort
7 0
2 years ago
Evaluate each condition as to whether it is true or not.
ivann1987 [24]

Answer:

For the first one you have not met those requirements because you are still 16, for the second one you have met those requirements because you can either have a score over 30 (which you have 34) or be a valedictorian

Explanation:

Above

7 0
3 years ago
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are a
nevsk [136]

Answer:

Backup and restore console should be utilized in that scenario.

Explanation:

4 0
3 years ago
Other questions:
  • In three to five sentences, describe how good e-mail work habits increase workplace efficiency and productivity.
    12·1 answer
  • William found out that someone used his report on American culture without his permission. What is William a victim of?
    13·2 answers
  • The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same messa
    10·1 answer
  • By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
    5·1 answer
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • 2.<br> The force of impact is
    5·1 answer
  • Write a simple Html structure and explain the meaning of each line
    8·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!