1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
11

A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its

software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Computers and Technology
1 answer:
Molodets [167]3 years ago
4 0

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

You might be interested in
1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
ale4655 [162]

Answer:

1.Mobile devices have a meta tag viewport that displays a web page content that fits within a mobile screen.

2.  A common technique for mobile websites is to hide navigation menus but to indicate their presence with a(n) hamburger, which is a symbol usually represented as three horizontal lines.​

Explanation:

  • Viewport is defined as a display screen size for websites. Before mobile phones and tablets all the websites were created with fixed  dimensions for screen display. But with the need of android, they were upgraded so that the websites fit themselves automatically on to the screen using a <meta> tag viewport.
  • Hamburger is a icon that leads to the list of different functions of a website or app. They mostly are used in android systems to give a compact view so that navigation menus could be hidden. The icon has a symbol of three horizontal lines one above the other.

I hope it will help you!

8 0
3 years ago
Which two statements are true about algorithms?
DENIUS [597]

Answer:

I. Algorithms can be written using pseudocode.

II. Algorithms can be visualized using flowcharts.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

The two statements which are true about algorithms are;

I. Algorithms can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. Algorithms can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

3 0
3 years ago
Read 2 more answers
Which is worse: Fast charging (Due to heat) or unplugging before reaching full capacity (On a normal charge)?
Ray Of Light [21]
Unplugging before reaching Capacity
4 0
3 years ago
24/3*2^2/2*3+(20-10)-40
ycow [4]

Answer:

34

Explanation:

You use pemdas

8 0
2 years ago
Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
Tom [10]

Answer:

Computer Monitors earned him maximum profit. For details, please check the attachment.

Explanation:

Please check the attachment.

Download xlsx
5 0
3 years ago
Other questions:
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • If you see ##### in a cell, you should
    10·1 answer
  • TIFF is the default file format for most digital cameras. State True or False.
    13·1 answer
  • Describe how to manipulate artwork in a presentation.
    13·1 answer
  • PLZZZ HELP 30 POINTS!!
    14·1 answer
  • What tool is provided in Windows to facilitate sharing data objects between applications and computers?
    8·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Wyatt has a database to keep track of his enormous collection of videos. How can Wyatt find the details for the game Lost on Mar
    11·2 answers
  • Does The ps5 digital have a disc drive even Though ps4 games are not compatible
    6·1 answer
  • The layer of the ISO/OSI responsible for source to destination delivery.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!