1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
6

When hundreds, thousands, or even hundreds of thousands of zombie computers are gathered into a logical computer network under t

he control of an attacker, this creates a(n)?
Computers and Technology
2 answers:
qaws [65]3 years ago
6 0
This is known as a BotNet.
Ainat [17]3 years ago
4 0
Virus such as a Trojan or Worm, and can cause network crashes.
You might be interested in
To quickly modify fonts, colors, and effects on a slide, a user can modify the _____. (Microsoft PowerPoint)
velikii [3]

<u>Answer</u>:

To quickly modify fonts, colours, and effects on a slide, a user can modify the Theme.

<u>Explanation</u>:

In Microsoft power point a theme is a group or collection of fonts , colours and effects that are pre-formatted to improve or enhance the presentation. We can  start changing the font , colours or effects or any pre-existing  themes  by selecting them.  

To Change colour:

  • In Design tab,  under the  Variants group, click on  the downward  and choose one colour from the colour variant gallery.
  • Now click on the customise colours which opens the  "Create New Theme Colours" dialog box. In this dialog box , in the  theme colours  we can make the necessary changes and save them as a new theme.

To change fonts:

  • In the View tab, choose Slide Master.In this tab, select "Fonts" and then select Customise Fonts.
  • Now "Create New Theme Fonts" dialog box opens where use can choose the required font size under the Heading font and Body font boxes.  Again this can be saved as a new theme. Changing the font of theme changes all the bullet texts and title.
7 0
3 years ago
The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
Afina-wow [57]

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

4 0
2 years ago
Advantages of python programming language
Sauron [17]

Answer:

Great starter programming language. Overall very powerful but for beginners the more advanced characteristics like GUIs are too complicated. This is coming from personal experience and after first experiencing programming through Python, Javascript is my new favorite.

Explanation:

a great video by code camp titled "Learn Python - Full Course for Beginners [Tutorial]" is a great starting point!

6 0
3 years ago
Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing
tankabanditka [31]

Answer:

thick

Explanation:

i took the test and got it right

6 0
2 years ago
How to take a pic with a cumputer
sattari [20]

Answer:

Ctrl+Shift+4

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In a @return tag statement the description:
    13·2 answers
  • Every chart has a corresponding ____ that contains the numerical data displayed by the chart.
    6·1 answer
  • Where is the thesis statement usually located in research paper?
    6·1 answer
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    6·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
    5·2 answers
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    5·1 answer
  • How Powerpoint is useful in education aspect?
    5·2 answers
  • What is the best example of personally identifiable information.
    8·1 answer
  • Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!