1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
9

When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th

e Internet, what is responsible?
Spyware
Worms
Viruses
Botnets
Computers and Technology
1 answer:
balu736 [363]3 years ago
4 0

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

You might be interested in
Does anyone know edhesive 4.3 question 1
navik [9.2K]

No

.................................. :)

5 0
3 years ago
Read 2 more answers
What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
sp2606 [1]

Answer:

Operating core is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means of improving their operating efficiency

Explanation:

  • At the bottom of the organization is the operating core.
  • These are the people that do the basic work of producing the products or delivering the services.
  • In the simplest organizations, the operators are largely self-sufficient, coordinating through mutual adjustment.
  • In those organizations, there is almost nothing but operating core.
8 0
4 years ago
A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
Paul [167]

Answer:

Complete solution is given below:

Explanation:

Java code:

//Header file section

import java.util.Scanner;

import java.io.*;

//main class

public class SalesTestDemo

{

//main method

public static void main(String[] args) throws IOException

{

  String inFile;

  String line;

  double total = 0;

Scanner scn = new Scanner(System.in);

//Read input file name

System.out.print("Enter input file Name: ");

inFile = scn.nextLine();

FileReader fr = new FileReader(new File(inFile));

BufferedReader br = new BufferedReader(fr);

System.out.println("Name \t\tService_Sold \tAmount \tEvent Date");

System.out.println("=====================================================");

line = br.readLine();

//Each line contains the following, separated by semicolons:

//The name of the client, the service sold

//(such as Dinner, Conference, Lodging, and so on)

while(line != null)

{

String temp[] = line.split(";");

for(int i = 0; i < temp.length; i++)

{

System.out.print(temp[i]+"\t");

if(i == 1)

System.out.print("\t");

 

}

//Calculate total amount for each service category

total += Double.parseDouble(temp[2]);

System.out.println();

line = br.readLine();

}

//Display total amount

System.out.println("\nTotal amount for each service category: "+total);

}

}

inputSale.txt:

Peter;Dinner;1500;30/03/2016

Bill;Conference;100.00;29/03/2016

Scott;Lodging;1200;29/03/2016

Output:

Enter input file Name: inputSale.txt

Name        Service_Sold    Amount    Event Date

=====================================================

Peter   Dinner       1500   30/03/2016  

Bill   Conference       100.00   29/03/2016  

Scott   Lodging       1200   29/03/2016  

Total amount for each service category: 2800.0

7 0
3 years ago
A solid weighs 20gf in air and 18gf in water .find the specific gravity of the solid​
swat32
<h2>Answer:</h2>

10

<h2>Explanation:</h2>

Specific gravity (also called relative density) is the ratio of the density of an object (or substance) to the density of a reference substance (mostly water). It has no unit and is given by the following;

Specific gravity = \frac{density-of-object}{density-of-water}

Specific gravity is also given by the ratio of the weight of the object in air to the loss of weight of the object in water. i.e

Specific gravity = \frac{weight-of-object-in-air}{loss-of-weight-in-water}            --------------(* * *)

In this case;

i. The object is the solid which has a weight of 20gf in air.

ii. The loss of weight of the solid in water is the difference between the weight in air (20gf) and the weight in water (18gf).

Therefore the loss of weight is

20gf - 18gf = 2gf

Now substitute these values from (i) and (ii) into equation (* * *) as follows;

Specific gravity = \frac{20gf}{2gf}

Specific gravity = 10

Therefore the specific gravity of the solid is 10

7 0
3 years ago
What is computer-aided design/computer-aided manufacturing (CAD/CAM)? a.A cultural trend that places value on an individual's ab
masha68 [24]

Answer:

C. RFID tag Systems are used to create the digital designs and then manufacture the products

7 0
4 years ago
Other questions:
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • Data are sent through a network on bundles called ____packets____. select one:
    14·2 answers
  • You need to install an RODC in a new branch office and want to use an existing workgroup server running Windows Server 2012 R2.
    10·1 answer
  • Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he
    15·1 answer
  • What is referred to by the phrase “Web 2.0”?
    11·1 answer
  • A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most
    9·2 answers
  • Explain the four misconceptions about entrepreneurship.
    7·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • 10<br> Which of the following is not one of the most popular Spreadsheet software applications?
    6·1 answer
  • Choose all items that represent features of the job application process.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!