1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
12

Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru

s (C) Worm (D) Trojan horse (E) Logic bomb
Computers and Technology
1 answer:
Alborosie3 years ago
3 0

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

You might be interested in
Suppose a friend asks you for advice on RSS feeds. What would be a reason you would suggest using RSS feeds?
Yuliya22 [10]

Answer:

to vein info ffom all search engines

4 0
3 years ago
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Elenna [48]

Answer:

Static

Explanation:

I just took the test man!

5 0
3 years ago
LAST TIME ASKING FOR APPS THAT ARE FREE THAT I DONT NEED TO PAY THE APPS HAVE TO HELP ME STOP VIRUSES FROM MY PHONE PLZ HELP THE
pashok25 [27]

Answer:

i wish i could help u but i cant find a "free" one

Explanation:

4 0
3 years ago
Read 2 more answers
Using the drop-down menus, correctly match the name of the person with the computer-programming
Sauron [17]

Answer:

1. Bill Gates and Paul Allen

2. Grace Murray Hopper

3. John Backus

4. Bjarne Stroustrup

5. Guido van Rossum

5 0
4 years ago
I am a you tuber that does videos on the rob lox myth community, I have over 250+ subscribers. I was wondering if any of y'all w
Marina86 [1]

Answer:

I will for sure subscribe!!!!

Explanation:

:)

7 0
3 years ago
Other questions:
  • How do I change my age on here?-<br> Why did it set it to 18???
    5·2 answers
  • The two key elements of any computer system are the ________ and the ________.
    12·1 answer
  • What’s the keyboard command I will allow you to copy text
    11·2 answers
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • If the point (9, 5) is translated 6 units left and 5 units up, then find the
    10·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Cuantos puntos de habilidad se puede tener en clubes pro?
    9·1 answer
  • Define data, information and the relation between the two?
    8·1 answer
  • True or false: Securing intellectual property digitally is the only security because that's how all IP is stored.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!