1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
5

Polymorphic refers to a malware's ability to:

Computers and Technology
2 answers:
harkovskaia [24]3 years ago
7 0
Polymorphism is malware's ability to change the way it appears on different computers. This makes it very difficult for antivirus software to identify the malware.
BigorU [14]3 years ago
4 0

Answer:

Ability to escape being detected

Explanation:

Polymorphic is simply the ability of a malware to escape the detection techniques which could cause or wreck havoc to the system. These detection techniques could able anti virus programs.

You might be interested in
Most case fans have standard _______________ connectors that are easy to plug in but can be forced to be connected the wrong way
SIZIF [17.4K]

Answer:

Molex

Hope this Helps!

4 0
2 years ago
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
1 year ago
How has the internet improved business communication worldwide
emmasim [6.3K]

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

4 0
2 years ago
Which are technical and visual demands that need to be considered when planning a project? Choose three answers
Marina CMI [18]

Answer: Resolution or DPI, deliverables, and file types are important technical and visual demands to consider when planning a project.

Explanation: Keep in mind whether or not the project will be published in print or on the Web.

8 0
3 years ago
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
Other questions:
  • The eastern front was longer than other fronts of the war true or false
    7·2 answers
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • The series of events that make up a story is called
    6·2 answers
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • Difference between volatile and non volatile memory
    14·2 answers
  • Which network media uses different regions of the electromagnetic spectrum to transmit signals through air?
    13·1 answer
  • Which ofthe following sentence beginnings would be best to use in apersuasive request?
    8·1 answer
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • One of the primary principles of the Rapid Application Development methodology is early prototyping of the _______ in the develo
    6·1 answer
  • How to count the total number of users from backend reactjs.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!