1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
12

Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru

s (C) Worm (D) Trojan horse (E) Logic bomb
Computers and Technology
1 answer:
Alborosie3 years ago
3 0

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

You might be interested in
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
Serjik [45]

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

4 0
3 years ago
________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
Arturiano [62]

Answer:

Behavioural targeting

Explanation:

Behavioural targeting is the method that enables advertisers to display more relevant ads based on user's search and browsing history. This is an online targeting technique that collects information from a particular user. This information comes from the person's browsing history. The information that comes from the browsing history enable advertisers to display specific targeted ads that would most appeal to the person in question.

7 0
3 years ago
Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
Hatshy [7]

Answer:

.N. Generación & Descripción

1

Primera Generación

El período de primera generación: 1946-1959. Base del tubo de vacío.

2

Segunda Generación

El período de la segunda generación: 1959-1965. Base del Transistor

3

Tercera generación

El período de tercera generación: 1965-1971. Circuito integrado de base.

4

Cuarta Generación

El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.

5

Quinta Generación

El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.

Explanation:

espero y esto te sirva de algo

3 0
3 years ago
Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tigh
cricket20 [7]
Camera and wagon are answer
4 0
3 years ago
Ports that expand the options for input, output, and storage, are commonly called ____________ ports.
Ostrovityanka [42]
The answer is expansion ports
5 0
3 years ago
Other questions:
  • What was the first browser that allowed for graphics to be viewed on the web?
    14·2 answers
  • A way to minimize technical problems with your computer
    14·1 answer
  • What happens if none of the selector values match selector in a simple case expression in pl/sql
    6·1 answer
  • Write a chemical reaction to show that nitric acid contains nitrogen​
    15·1 answer
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • 1.
    13·1 answer
  • Can you guys give some samples of STEM-related studies?​
    7·2 answers
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • The term used to describe an OS designed mainly to share network resources.
    10·1 answer
  • ASAP 50 POINTS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!