1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
15

6. Which of the following is malware? (1 point)

Computers and Technology
2 answers:
inessss [21]3 years ago
8 0

6: Malware is software (like viruses) designed to damage or harm your device.

7: What Sosa did to violate HBO®'s copyright laws was that he recorded and sold episodes of G.O.T. and sold them online.

marusya05 [52]3 years ago
5 0
Software to damage computers
You might be interested in
Is media good for the brain?
skad [1K]

Of course yes, and that depends of the type of content that you eaten =D

Media is a source of good information for to create your opinion.

Best regards

7 0
3 years ago
Read 2 more answers
Please answer my question y'all!
katrin [286]

Answer:

Explanation:1000 mp3s

6 0
3 years ago
Read 2 more answers
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
777dan777 [17]

Answer:

Is it related to technology and computers?

3 0
3 years ago
What keyboard key can you press to limit the angle of the line when using the pencil tool?
leva [86]
F6,p hope that helps :)
6 0
3 years ago
Other questions:
  • What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
    6·2 answers
  • How often are computer and user policies applied after a user has logged into a computer?
    15·1 answer
  • Which field can be used to track the progress on tasks that a user has created?
    10·1 answer
  • What does the rule of five say?
    12·2 answers
  • 11. Print Layout, Full Screen Reading, Web Layout, Outline and Draft are examples of _______. 12. What do you do if the spelling
    5·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • . _______ are used to categorize information found on the web
    13·1 answer
  • My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
    6·1 answer
  • Suppose that the first goal in a GP problem is to make 3 X1 + 4 X2 approximately equal to 36. Using the deviational variables d1
    15·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!