1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
4 years ago
9

A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-unde

sirable event for the victim.
Computers and Technology
1 answer:
NNADVOKAT [17]4 years ago
7 0

Answer:

A computer virus

Explanation:

A computer virus is categorized as malicious software that is built just like any other program out there to cause damage, steal, or disrupt a victim’s computer system. They infect systems and networks in various ways. Most are designed to move in stealth and attach themselves to other programs. Others, however, exploit an unpatched vulnerability and propagate themselves into harmful programs. Depending on how they are designed, most viruses insert a copy of themselves, spread rapidly from within files of a computer, and even extend to other computers in a network.

You might be interested in
Which wireless technology connects with most mobile devices?
LenaWriter [7]

Answer:

¡) Internet

¡¡) Alexa

¡¡¡) Electronic Devices

8 0
2 years ago
Finish this for brainliest and 30 points
n200080 [17]
What do you mean what are we supposed to finish

6 0
3 years ago
Brian needs to assign a macro to a button on the ribbon. Where should he go to achieve this goal?
8_murik_8 [283]

Answer: A. Record Macro dialog box.

Explanation:

3 0
4 years ago
Read 2 more answers
Low-level programming languages are considered closer to human languages, making them easier for programmers to learn and use.
zubka84 [21]
I think the answer is True I hope it helps
4 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
Other questions:
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • Which steps will create a new blank word document
    9·1 answer
  • Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
    13·1 answer
  • What is ana absolute adress
    11·1 answer
  • Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use
    8·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • Which best describes how a supporting database will be structured?
    10·1 answer
  • Which of the following are causes of a run-time error. Choose all that apply.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!