1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
11

A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its

software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Computers and Technology
1 answer:
Molodets [167]3 years ago
4 0

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

You might be interested in
Physical education is the body's ability to function effectively and efficiently without excessive farigue. TRUE/FALSE
Salsk061 [2.6K]

Answer: True

Explanation:

6 0
3 years ago
Which of the following describe a required
ELEN [110]

Answer:

The last 2 point in the given question is the correct answer to the given question i.e

  • an argument passed to the function in the  correct positional order
  • an argument wherein the number of  arguments in the function call should match  the definition of the function.

Explanation:

The required  argument are those argument that are passing to the method the in the right location order.In the required argument the number of arguments in the call method must match the definition of the function .

For example

def fun( s ): #function definition  

   print(s) #display s

fun('er')#calling

In this example  there is  function fun() in which we pass the argument 'er'  we call that function from main() .The control moves to the function definition it checks the number of argument in the calling function fun() is matched with the definition of function fun()  and print 'er'.

All the other option are not describing the required  argument that's why this is incorrect option .

8 0
3 years ago
The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve
elena55 [62]

Answer:

It does all of these

Explanation:

The stub is able to do all of what we have in this question. It can locate computer connections, locate ports on a computer, transit message to server etc.

in distributed computing, a stub is a piece of code that does the work of converting parameters that are passed between the client and the server at a time of remote procedure call.

The main objective of an RPC is to allow the client to call procedures remotely on another server.

3 0
3 years ago
To display “ hello ” message on the screen
Alex787 [66]

Answer:

hello like that

it's in order

4 0
3 years ago
To save a file so that it can be opened on most computers, select the _____ option.
romanna [79]
Save it on the cloud.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a main method that prompts the user for an integer between 1 & 10 (inclusive). If the user enters an invalid number, p
    10·1 answer
  • g What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in
    10·2 answers
  • Steps in the systems development life cycle​
    15·2 answers
  • What is an advantage and disadvantage to file compression
    8·1 answer
  • Question #4
    10·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • Complete the following sentence.
    12·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!