1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
11

What type of malware is heavily dependent on a user in order to spread?

Computers and Technology
1 answer:
frosja888 [35]3 years ago
5 0
The answer is " Virus" !
You might be interested in
Three IT Companies. Help me please!
GuDViN [60]

Answer:

Apple, Samsung and Foxconn

Explanation:

They are the leading it companies today

3 0
3 years ago
Read 2 more answers
What are the steps of active listening?
SashulF [63]
1 prepare mentally
2 pay attention
3 allow the speaker to talk without interruption until he is done
4 provide feedback
5 repeat the feedback until you and the communicator are satisfied that the message was conveyed well
7 0
3 years ago
When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages,
Anna11 [10]
<span>When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages, consumers embrace one of the greatest virtues of social media known as Collaboration.</span>
5 0
3 years ago
Pleas help I will give brainiest
stellarik [79]
1) A
2)D
3)C
4)A
5)D
Hope this will help u
5 0
3 years ago
Read 2 more answers
Which section of a personal narritive requires the most development?
Naily [24]
A characters introduction because a personal narrative is a thing written about a person/charector
4 0
3 years ago
Other questions:
  • False when you tap or click the ‘decrease font size’ button, excel assigns the next lowest font size in the font size gallery to
    13·1 answer
  • List of most popular entertainment and culture websites
    15·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • Which one is correct
    8·1 answer
  • If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you shoul
    8·1 answer
  • What are the four stages a customer goes through when buying a product?
    7·2 answers
  • Son opciones de configuración espacio multimedia llamado blog
    9·1 answer
  • What are the paparazzi?
    8·1 answer
  • Smart art can be used to create that highlight relationships between two items
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!