1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
12

Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru

s (C) Worm (D) Trojan horse (E) Logic bomb
Computers and Technology
1 answer:
Alborosie3 years ago
3 0

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

You might be interested in
What is a functional simulation?
Anika [276]
D) a type of training that allows...
4 0
4 years ago
What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
Greeley [361]

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

  • In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.
  • In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.
  • In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

6 0
3 years ago
According to the 2014 Pew Research Center analysis of U.S. census data, 84% of U.S. households own a(n) __________.
olga_2 [115]
Computer. :) 73% have a computer with a broadband connection to the internet, if you need that info too. 
4 0
3 years ago
Read 2 more answers
Jameelah has files all over her computer. Thus, it is often difficult for her to find the files she is looking for.
VLD [36.1K]

Answer:

folders

Explanation:

it is a very good way to keep your desktop organized and keep tidy

3 0
3 years ago
The third assignment involves writing a Python program to compute the cost of carpeting a room. Your program should prompt the u
mojhsa [17]

Answer:

# price of the carpet per square foot for each quality.

carpet_prices=[1,2,4]

def cal_cost(width,height,choice):

 return width*height*carpet_prices[choice-1]  

width=int(input("Enter Width : "))

height=int(input("Enter Height : "))

print("---Select Carpet Quality---")

print("1. Standard Quality")

print("2. Primium Quality")

print("3. Premium Plus Quality")

choice=int(input("Enter your choice : "))

print(f"Carpeting cost = {cal_cost(width,height,choice)}")

Explanation:

The cal_cost function is used to return the cost of carpeting. The function accepts three arguments, width, height, and the choice of carpet quality.

The program gets the values of the width, height and choice, calls the cal_cost function, and prints out the string format of the total carpeting cost.

3 0
3 years ago
Other questions:
  • Side mirror using convex mirror or concave mirror?​
    5·2 answers
  • What are the advantages of repeating a header row? check all that apply
    14·1 answer
  • Commercial applications are never free<br><br> -True<br><br> -False
    9·1 answer
  • Help me on this question
    14·1 answer
  • In "When Is a Planet Not a Planet?" why does the author say that the outer planets are made of gas when the inner planets are ma
    5·1 answer
  • A. Requiring computer users to log off before leaving for lunch
    11·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
  • 2) Please create a C program for the following: (25 points) a. Suppose the US dollar to Korean Won is 0.85 dollars to 1000 won.
    13·1 answer
  • Computer system with a 32-bit logical address and 4k-byte page size. assume that each entry of a page table consists of 4bytes.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!