1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
15

What is the correct terminology for a group of infected computers controlled by a person to commit cyber-crime?

Computers and Technology
1 answer:
Pavel [41]3 years ago
5 0
I believe it’s called a virus or a hacker
You might be interested in
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
What are the correct answers to the following questions?
Lena [83]

Answer:

1. analog sound

2. digital sound

3. pixels

4.  local area network

5.bus

6. slots

Explanation:

4 0
2 years ago
Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
patriot [66]

Answer: i dont know but have an great day

Explanation:

5 0
3 years ago
Could someone help! I need to write a Python program based on Graphical User Interface.
Kamila [148]

Answer:

ik its not an answer but it kinda is.. uh GOOGLE

Explanation:

6 0
3 years ago
Read 2 more answers
Computer programs can be opened from where?
lions [1.4K]

Answer:

Desktop

Explanation:

Start button on windows:  Start allows you to access your computer programs and configure Microsoft Windows easily by accessing the Start menu.

Finder on macs:  the Finder is your gateway to all of the files, apps, and downloads on your Mac.

6 0
3 years ago
Read 2 more answers
Other questions:
  • which of these paste options is commonly available from the paste options button? A> use the destination them. B. keep the em
    14·2 answers
  • Which type of programmer designs programs for applications executed on the internet?
    10·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • How do i build a supercomputer.?
    11·1 answer
  • What is human data,
    8·1 answer
  • All of the following are helpful tips for protecting your digital privacy, except:
    10·2 answers
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • 30 Points!!
    13·2 answers
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
  • An online bank wants you to create a program that shows prospective
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!