1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
12

Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru

s (C) Worm (D) Trojan horse (E) Logic bomb
Computers and Technology
1 answer:
Alborosie3 years ago
3 0

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

You might be interested in
Please define processor​
fredd [130]
Processor means to break down something.
6 0
3 years ago
What is the potential outcome for an author if she uses a word without realizing its connotation? she may write something that s
zubka84 [21]

A potential outcome for an author who uses a word without realizing its connotation is: A. she may write something that she does not mean.

<h3>What is connotation?</h3>

Connotation refers to the quality, feeling or an idea which a word brings to the mind of a reader or listener, as well as its literal, dictionary or primary meaning.

This ultimately implies that, a potential outcome for an author who uses a word without realizing its connotation is that he or she may write something that she does not mean or pass across an information she didn't intend to.

Read more on connotation here: brainly.com/question/20236939

#SPJ1

3 0
2 years ago
It is a group of two or more computer system connect to each other​
Sedbober [7]

network is a group of two or more computer system connected together

8 0
3 years ago
2) A language that changes code to machine-readable code one command at a time is known as what
iogann1982 [59]

Answer:

2) Interpreted programming languages (e.g. Python, Perl)

3) In computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. That means that the each programing language has its own specific rules.

4) Pseudocode

5) Cryptographic coding, examples: The Caesar shift, Kryptos

5 0
3 years ago
Bluetooth headphones does or do not use wireless data transmission
galben [10]

Answer:

To put it simply: no, using Bluetooth won't affect your cellular data in any way. Bluetooth works using short-range radio waves, not an internet connection. This means that Bluetooth will work anywhere you have two compatible devices — you don't need any sort of data plan, or even a cellular connection.

7 0
3 years ago
Other questions:
  • What is the process of analyzing data to extract information not offered by the raw data alone? data mart analysis data mining d
    8·1 answer
  • The Circle of Growth
    10·1 answer
  • 3.18: Pizza Pi Joe’s Pizza Palace needs a program to calculate the number of slices a pizza of any size can be divided into. The
    7·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • H&amp;R Block's stated purpose is: to be the leading global consumer tax company bringing tax and related solutions to clients y
    15·1 answer
  • A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
    15·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
    14·1 answer
  • What would be the printed output of the Python code to the right?
    14·1 answer
  • 1) What is y after executing the statements?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!