1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
3 years ago
13

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

Computers and Technology
1 answer:
alexandr1967 [171]3 years ago
8 0
The answer is B. Trojan (causes damage to computer)

hope this helps

You might be interested in
The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
Svetllana [295]

Answer: b

The computer virus is simply a ___

b. Set of computer instructions or code

4 0
3 years ago
FIRST AMSWER GET BRAINLIEST​
MA_775_DIABLO [31]

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

4 0
3 years ago
A structure is private by default, but can be declared to be friend or private.
posledela
Structures can be accessed from anywhere within the module or class in which they are declared. A structure is Friend by default. To specify the accessibility in more detail, include Public, Protected, Friend, Protected Friend, or Private in the Structure statement. You must declare every data member of a structure.
4 0
3 years ago
45, 78, 23, 12, 63, 90, 38, 56, 88, 15 Using the sequential search as described in this chapter, how many comparisons are requir
Alecsey [184]

Explanation:

By using the sequential search we find the following results.

  • The first key is 90 and its comparison number is 6.
  • The second key is 14 and its comparison number is 10.
  • The third key is 45 and its comparison number is 1.
  • The fourth key is 23 and its comparison number is 3.
  • The fifth key is 5 and its comparison number is 10.
8 0
3 years ago
A file can be safed with a different file name then it currently has by clicking on save ? in the file tab
Mazyrski [523]

Answer:

Click the File tab. Click Save As. Choose a file location, such as OneDrive or This PC to store your file.

Explanation:

click the File tab. Click Save As. Choose a file location, such as OneDrive or This PC to store your file. In the File name box, enter a new name for the file. In the Save as type list, click the file

5 0
2 years ago
Other questions:
  • Which component of a computer is its input device and what role does it play in a document?
    6·1 answer
  • Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
    6·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • A field with the ____ data type can store a unique sequential number that Access assigns to a record. Access will increment the
    7·1 answer
  • What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
    11·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 re
    5·1 answer
  • Edhesive AP Computer Science Coding Activity 2:
    14·1 answer
  • What starts with p and ends with orn
    15·2 answers
  • A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!