1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
13

Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un

authorized process to occur or by granting unauthorized access is known as
Computers and Technology
1 answer:
Paha777 [63]3 years ago
4 0
<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
You might be interested in
How Extreme Programming addresses Software Testing andevolution ?
kumpel [21]

Answer:

Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.

Testing

Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.

Evolution in Extreme programming is like this:-

Coding:-First programmers will code the problem.

Testing :- Testing is done to remove flaws.

Listening:- Programmers must listen to the customers to what they need.

Designing:-Then design according to the customer needs.

6 0
3 years ago
Discussion Topic:
hodyreva [135]

Answer:

Prevents lagging

Explanation:

This prevents the website from being slow and upto shape so those who access it dont have difficulties

7 0
2 years ago
Anyone help me with number 41.
Katarina [22]
It is te = t I yhink
8 0
3 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
Which of the following URL extensions indicate the website is used by the United States government? .org .gov .col .edu
lakkis [162]

Answer:

gov

Explanation:

i think?? lol

8 0
3 years ago
Read 2 more answers
Other questions:
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • What is the QOS model?
    6·1 answer
  • If you need assistance with your I-20 which phone number at UC would you call?
    10·1 answer
  • Given that two int variables, total and amount, have been declared, write a loop that reads integers into amount and adds all th
    11·1 answer
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • The instructions in the language of alice are contained on ____ which you can drag and drop into place to ____ new programs
    8·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • a blank search examines the first item to see if it is a match, then the second, and so on. answers: linear, binary, and orderly
    7·2 answers
  • ASAP BRAINLIEST!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!