1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
2 years ago
15

The NSA could be hiding small snooping programs in, let's just say, a picture of a cute kitten or a fun Android game." So how ca

n the average Joe ever know that what they download is the real picture or app with no hidden malware in it?
Computers and Technology
1 answer:
grin007 [14]2 years ago
8 0
One way could be to check the code of the program.
But of course this might not be possible... Not everyone knows a programming language. And even if you did, you might not know the programming language they used.

Another way is to download a program that monitors your incoming connections and outgoing connections from your computer/android/iphone.

When someone or something connects to your device, the program should alert you. Or when the computer makes a connection to a website/device.
You might be interested in
Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
nikitadnepr [17]

Answer:

The answer is "auditors"

Explanation:

Description to this question can be described as follows:

  • Auditors are professionals who analyze business and corporate accounts to determine, that the financial reports are accurate and lawful. It will serve as a consultant to suggest possible measures for risk avoidance or cost reduction.
  • Data security is the mechanism to avoid theft, loss of sensitive information, and information quality is critical and it is not able to know or stay in contact with your clients without high-quality data, that's why auditors are the correct answer and other choices can't be defined in the following senior.
7 0
3 years ago
What does obsolete mean?
Alex
No longer produced or used; out of date.
8 0
3 years ago
Read 2 more answers
Which of the following calculations would evaluate to 12?
lidiya [134]

Answer:

the answer for this is 3*(6+2)/2)

8 0
3 years ago
Expand and simplify the following expressions. 1/2 [ 2x + 2 ( x - 3)] *​
Lerok [7]

Answer: 2

x

−

3

Explanation:

4 0
2 years ago
What did Peter and Rosemary do for a living?<br>​
marta [7]

Answer:

Peter and Rosemary Grant are distinguished for their remarkable long-term studies demonstrating evolution in action in Galápagos finches. They have demonstrated how very rapid changes in body and beak size in response to changes in the food supply are driven by natural selection.

Explanation:

please

6 0
3 years ago
Other questions:
  • considering that two variables counters and accumulators are important in loop design. What would be their purpose?
    9·1 answer
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    10·1 answer
  • What bus carries a status signal back to the CPU?
    14·1 answer
  • Who is the owner of microsoft company​
    12·1 answer
  • How can i complain a rude comment
    7·1 answer
  • Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
    5·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • Giving Brainliest IFFF CORRECT
    9·1 answer
  • What term is used to refer to the merging of government services with information technology?
    11·1 answer
  • While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!