Answer:
code
Explanation:
code are set of instruction executed by the computer.
Answer:
True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.
Explanation:
Answer:
Trojan horses
Explanation:
The name is derived from the Trojan horse used by Odysseus to pass some soldiers inside the walls of Troy and win the war. This malware disguises like a normal program, or even like a utility, to trick you into installing it, but when you run the program the destructive or stealing function is activated.
File-Save As- Name it-then put it where you need it.
Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
- Accounts payable could be disturbed by changing cash in payment false.
- Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
- Transaction fraud like hacking, masquerading are very common in a networked system.