1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
11

A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its

software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Computers and Technology
1 answer:
Molodets [167]3 years ago
4 0

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

You might be interested in
Cuthbert Industrials, Inc., prepares 3-year comparative financial statements. In Year 3, Cuthbert discovered an error in the pre
Lelechka [254]

Answer:

Restate financial statement for the first and second year.

Prepare financial statement of year 3 reflecting the effects of error from year one and two

Explanation:

A revision of the the entire financial statement from year one will be helpfull, when this is re-stated for the first and second year. Then in stating the amount of assets and liabilities carried into year three, the cummulative effect of the error from the previous two years should be reflected.

8 0
3 years ago
A example of an <br> "ITERATIVE STATMENT"
timama [110]

Answer:

for(let i = 0: i <=5; i++) {

console.log(I)

}

Explanation:

An iterative statement repeats a body of code until the condition is not true. Here we declare an integer (i) and make it 0. Then the loop checks if the second part is true (i is less than or equal to 5), and if it is true, it executes the code inside the loop body, which logs i, and finally runs the last past, which increments i by one. When the second part becomes false, the loop exits.

7 0
2 years ago
Which of the following us considered to be intellectual property? Picturez or images on the internet, books, computers. Ortennis
klasskru [66]
Intellectual property is anything that has been designed, technically all of the above is a form of intellectual property. If only one answer is possible, I believe the best choice is images on the internet.

Speaking for the rest however, literary work is created and therefore the book is as well. Computers are designed so the specifications and design plans are also intellectual property. Same goes for the shoes
4 0
3 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
Animation affects can be applied on both................ and................ on a slide​
babunello [35]
Answer: Animation effects can be applied on both (text and graphics) on a slide.

hi!
3 0
3 years ago
Other questions:
  • When an IPv6 device with no pre-configured IPv6 address powers up, it can calculate a global 128-bit IPv6 address for itself usi
    12·1 answer
  • What types of storage can be used to access data from another computer
    8·2 answers
  • Newt Corporation, headquartered in Los Angeles, is a nationwide provider of educational services to post-graduate students. Due
    9·1 answer
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    7·1 answer
  • True/False: When you make a function call, the order of the arguments you send does not matter as long as the number of argument
    15·1 answer
  • Which segment of society introduced the grunge look?
    5·2 answers
  • PLEASE HELP!!!
    12·1 answer
  • Short note on first generation computer​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!