1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
4 years ago
11

A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa

lse
Computers and Technology
1 answer:
Harman [31]4 years ago
5 0
False. A trojan horse is a type of malware that misleads as to what it does.
Example: “Click here to download Sims for free!”
You click it, and next thing you know instead of getting Sims for free you have a virus.
You might be interested in
What happens to weather patterns when a cold front approaches? What happens to
matrenka [14]

Answer:

The overview including its problem is listed in the explanation segment following.

Explanation:

  • The cool, unobstructed front develops whenever the cool front overwhelms the warm side or front.
  • The warm front increases over its colder, then gradually move towards the surface of the earth.

The subsequent weather system seems to be close to something like a moving warmer front.

So that the above seems to be the right answer.

4 0
3 years ago
What is fruit nursery?​
Natasha2012 [34]
A place where young plants are produced through different ways is a nursery. The main work of nursery is to supply young plants and seeds for cultivation purposes for both fruits and vegetables. ... An appropriate environment for germination of seed. The nursery is also very useful for purpose of vegetation propagation.
7 0
3 years ago
Read 2 more answers
The hardware components of a computer system interact with each other by using which of the following?
Inga [223]
B it is b..............................................
6 0
4 years ago
Read 2 more answers
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
kompoz [17]

Answer:

True

Explanation:

People will judge you based upon your non-verbal communication. If your non-verbal communication is bad then you might not get the job.

8 0
4 years ago
Other questions:
  • While there are many types of sediments, those that make up sedimentary rocks must be transported by running water.
    9·1 answer
  • Sarah's employer purchased a health insurance plan that costs $750 per month. Sarah pays $75 toward the plan each month. What is
    5·2 answers
  • Which of the following office online apps is most effective for creating multi media presentation
    10·2 answers
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    6·1 answer
  • List the seven basic internal components found in a computer tower
    7·1 answer
  • Signals that can travel in only one direction on a medium are referred to as what type of signal?
    12·1 answer
  • 9. What will help you determine the kinds of tools, equipment and utensil you will assemble, sanitize, inspect or check?
    13·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
  • What is the result when you run the following program?
    9·2 answers
  • You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!