1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
8

A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o

r buys. Internet worm Bot Middleware Spyware
Computers and Technology
2 answers:
galina1969 [7]3 years ago
5 0

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

andreev551 [17]3 years ago
3 0

Answer:

Spyware

Explanation:

Computer network systems are intercommunication of connected devices, to share resources within and to other remote networks. Network security policies and technical control system technologies are used by a network or system administrator to prevent unauthorized and unauthenticated access to user account in the network by cyber attackers.

Cyber attackers are individuals or group of individuals with the traditional hacking skills to exploit network and system vulnerabilities, to steal information. Malwares are used by hackers to covertly access networks. The spyware is a monitoring Trojan horse malware, used to monitor the activities of a user, steal information for fraudulent purposes.

You might be interested in
Word can only print documents on one size of paper.<br><br> True or false
Elena L [17]

Answer:

False

Explanation:

You can always go in the document settings to change the layout and make the paper wider (landscape).

Layout > Orientation

Choose portrait or landscape

5 0
3 years ago
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
Bas_tet [7]

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

8 0
3 years ago
A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the atte
11Alexandr11 [23.1K]

Answer:

Attenuation = 0.458\ db

Explanation:

Given

Power at point A = 100W

Power at point B = 90W

Required

Determine the attenuation in decibels

Attenuation is calculated using the following formula

Attenuation = 10Log_{10}\frac{P_s}{P_d}

Where P_s = Power\ Input and P_d  = Power\ output

P_s = 100W

P_d = 90W

Substitute these values in the given formula

Attenuation = 10Log_{10}\frac{P_s}{P_d}

Attenuation = 10Log_{10}\frac{100}{90}

Attenuation = 10 * 0.04575749056

Attenuation = 0.4575749056

Attenuation = 0.458\ db <em>(Approximated)</em>

7 0
3 years ago
What is the device called which typically combines the capabilities of a scanner, printer, fax, and copying machine?
maria [59]
The device which typically combines the capabilities of a scanner , fax ,and copying machine is called an input device.
5 0
3 years ago
If you are trying to reduce the cost of college which of the following strategy is likely to save you the most money
Allisa [31]
A scholarship of any kind will work because the college pays u money and a loan will take forever to pay back and u might be in debt for a long time
7 0
3 years ago
Read 2 more answers
Other questions:
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • THE bestValue PROBLEM Using the Camera structure defined in file p1.cpp, write the function named bestValue(). The function take
    13·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize rel
    11·1 answer
  • Does anyone know any nitro type hack??
    13·2 answers
  • Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you w
    8·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • How are special characters added to a Word document? Check all that apply.
    6·2 answers
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    11·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!