1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
8

Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a

malicious file b) A link in an email that downloads a virus c) An executable file that replicates throughout the network d) A computer game that creates a backdoor into your computer
Computers and Technology
2 answers:
vredina [299]3 years ago
4 0

Answer:

d) A computer game that creates a backdoor into your computer

Explanation:

Trojan horse is a type of malware that is often disguised as legitimate software. They can be employed by cyber criminals and hackers to try to gain access to users' systems. In general, users are tricked by some form of social engineering to load and run Trojans on their systems. Once activated, Trojans allow criminals to spy on you, steal your confidential data and gain access to your system through the back door. An example of a Trojan horse is a computer game that creates a backdoor on your computer.

With a backdoor Trojan horse, malicious users remotely control the infected computer. With it, the author can do whatever he wants on the infected computer, such as sending, receiving, starting and deleting files, displaying data and restarting the computer. Backdoor Trojans are often used to assemble a set of computers and form a botnet or zombie network, which can be used for criminal purposes.

sergij07 [2.7K]3 years ago
3 0

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

You might be interested in
What is a survey? plz hel​
Naya [18.7K]

Answer:

The act of seeing and recording information.

4 0
3 years ago
Read 2 more answers
Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
ehidna [41]

It is given that the feetVal and inchesVal are parameters of the SetHeight() function. Since the return type of the function is structute, so we need to define a structure.

After that, we need to create a structure variable within the function definition. Now, assign the feet and inches with the feetVal and inchesVal respectively. Finally return the structure variable.

Further explanation:

#include<stdio.h>

//define the structure

typedef struct HeightFtIn_struct {

int feet;

int inches;

} HeightFtIn;

//define the function

HeightFtIn SetHeight(int feetVal, int inchesVal)

{

HeightFtIn Htft; //creating a structure variable of type HeightFtIn

//assign the value of feetVal

Htft.feet = feetVal;  

Htft.inches = inchesVal; //assigning the value of inchesval

//return the structure variable

return Htft;

}

int main(void) {

HeightFtIn studentHeight;

int feet;

 int inches;

printf("Enter the values of feet and the inches: ");

scanf("%d %d", &feet, &inches);

studentHeight = SetHeight(feet, inches);

printf("The student's height is %d feet and %d inches.\n", studentHeight.feet, studentHeight.inches);

return 0;

}

Output:

Enter the values of feet and the inches: 5 9

The student's height is 5 feet and 9 inches.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. How does coding work on computers?  brainly.com/question/2257971 

Answer details:

Grade: College Engineering

Subject: Computer Science

Chapter: C  Programming

Keyword:

C++, input, output, programming, statements,  loops, if, else, statements, firstname, lastname, base class, derive class, vector, print

6 0
3 years ago
Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
PtichkaEL [24]

Answer: 3 bytes

Explanation:

A Pixel uses 3 colors and each of these colors uses 8 bits to store their intensity.

One pixel will therefore have:

= 8 * 3

= 24 bits

1 byte = 8 bits

24 bits will therefore be:

= 24/8

= 3 bytes

6 0
3 years ago
The banner on the front page of a newsletter that identifies the publication is the:.
podryga [215]

Answer:

Nameplate

Explanation:

The banner on the front of a newsletter that identifies the publication is its nameplate.

7 0
2 years ago
What kind of error is there in this line of code: pritn(“Hello, world!”)?
ivolga24 [154]

Answer:

3.algorithm error

4 0
2 years ago
Read 2 more answers
Other questions:
  • To track website behavior data with google analytics, which steps will you need to complete?
    14·1 answer
  • What is a good technological design?
    13·1 answer
  • Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
    13·1 answer
  • Please please please help I beg I'll give brainiest. :(
    5·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • How will you ensure that all of the network's applications and tcp/ip services also support ipv6?
    10·1 answer
  • Java Programming
    14·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • Plsssssssss help me​
    8·1 answer
  • When determining how much money to borrow in loans to pay for your higher education, which of the following items should not be
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!