1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
9

When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th

e Internet, what is responsible?
Spyware
Worms
Viruses
Botnets
Computers and Technology
1 answer:
balu736 [363]3 years ago
4 0

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

You might be interested in
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
What are factors that limit a technological design
Oksana_A [137]
The factors that limit a technological design can be physical and social. The physical limitations are constraints due to nature itself. They  include natural laws and properties of materials.
Social limitations on the other hand <span>are limitations that arise as a result of the society we are living in and include the ease of use, safety, attractiveness, and <span>cost.</span></span>
7 0
3 years ago
Read 2 more answers
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
What is the best application to keep track of inventory for a store?
exis [7]

"The site iGeeks Blog recommends Inventory Tracker, which functions as a comprehensive inventory tracking system for iPad.

"It works excellently in synchronizing your inventory and comes with some really amazing features that you’d only expect from a desktop app," said the blog.

A free version of the app is available, and the pro version is just $3.99."

3 0
4 years ago
Which stride number should you use to reverse the order of characters in a slice?
S_A_V [24]
These are the correct answers to the following questions:
<span>
1. Which stride number should you use to reverse the order of characters in a slice?
A. -1

2. What is forking?
c. Taking code from a currently developed project to make a different version

3. What is a bug?
B. An error in a program's code

4. The turtle program is a/an _________ included with Python that can be imported for use in Python code.
c. Module

5. What is a graphical user interface (GUI)?
b. The windows, buttons, menu items, icons, and dialog boxes with which a computer user interacts

6. Which of the following is an advantage of using variables?
D. It makes it less likely that an error will be introduced into the code.

7. What would you expect as the result of the code "happy" + "birthday"?
D. "happybirthday" 

8. When you make copies of a class, those copies are called _________ of the class.
D. Instances

9. What are methods?
A. The functions associated with a class

10. What are comments meant to do?
C. Explain what some code is doing

11. Which of the following types of software hides its code and doesn't let other people change it?
D. Proprietary software

12. If you want to save a program so you can run it later, you should create the program in which window?
b. The text editor window

13. A _____________ is a clickable graphical object that makes something happen when the user clicks it, usually with the left mouse button.
A. Button

14. A/an ____________ development method is one in which the development does not follow a predictable or planned course of action.
A. Informal

15. What are shortcuts useful for?
A. Making it easier and quicker to open a file
</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • 12. In Microsoft Word, when you highlight existing text you want to replace, you are in A. basic mode. B. automatic mode. C. ins
    10·2 answers
  • The amount you pay your insurer for your insurance plan is which of the following?
    14·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • Providing incentives for customers to learn more about your service is known as?
    7·1 answer
  • Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
    15·1 answer
  • Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and
    12·1 answer
  • The following are the CPU and I/O behavior of three processes, timings in seconds.
    9·1 answer
  • 1) a program that is designed to perform only one task.
    11·1 answer
  • Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance
    7·2 answers
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!