1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
9

What term is used for a seemingly harmless program that has malicious code hidden inside?

Computers and Technology
1 answer:
Delicious77 [7]3 years ago
8 0
That is none other than a "Trojan Horse"
You might be interested in
What does the "configure dhcp options for proxy dhcp" option do?
ZanzabumX [31]
You should select the configure DHCP options for proxy DHCP option if the local DHCP server is a Microsoft DHCP server, if you select this option the DHCP server is automatically configured to forward the PXE requests to the WDS server. If the local DHCP server is not a Microsoft DHCP server, you have to configure the DHCP server manually to forward the request to the WDS server. 
5 0
3 years ago
In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
Ludmilka [50]

Answer:

the goal is to understand what users and applications the network will support.

Explanation:

A traditional network design approach is said to follow the structured systems of analysis as well design process that is similar to that which is used in building such applications. The main goal of the application developers is understand and study the needs of the users and also the application which the network will support.

5 0
2 years ago
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
sdas [7]

Solution:

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the bits per seconds.

Thus this is the required answer.

6 0
3 years ago
Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
Komok [63]
1. S
2. S
3. P
4. ??
5. S

8 0
3 years ago
Read 2 more answers
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
Leni [432]
If the computer you are using is a laptop that moves from one network to another, you can click the Alternate Configuration tab and configure a static IP address setting for a second network.
4 0
3 years ago
Other questions:
  • Which graphic design tool allows you to lay images on top of one another? A. Layers B. Selection C. Drawing D. Color
    10·2 answers
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    6·2 answers
  • You have just replaced the NIC on a server, making no other changes. It can communicate with all the computers on its network bu
    14·1 answer
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current dir
    15·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • Write a definition in your own words for intranet. Please don't copy and paste.
    7·2 answers
  • Chose the term that matches each definition.
    15·1 answer
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!