1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
15

6. Which of the following is malware? (1 point)

Computers and Technology
2 answers:
inessss [21]3 years ago
8 0

6: Malware is software (like viruses) designed to damage or harm your device.

7: What Sosa did to violate HBO®'s copyright laws was that he recorded and sold episodes of G.O.T. and sold them online.

marusya05 [52]3 years ago
5 0
Software to damage computers
You might be interested in
Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False
Sauron [17]

Answer:

A. True

Explanation:

Data encryption is a technique that converts clear text into unreadable text and transmitted over a network, to prevent attackers from understanding the information send to the receiver, which can only be deciphered by the receiver and the sender with special keys or software.

An intrusion prevention system is used to mitigate cyber attackers by preventing unwanted packets that could be malicious, from entering the network.

The intrusion prevention system can only see clear text data. For this reason, an encrypted text can pass through the prevention system untouched.

3 0
3 years ago
When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size
netineya [11]

Answer:

adding text to the shape

changing the size of the shape

changing the location of the shape

Explanation:

A word is can be regarded as graphical word processing program on the computer which can be used by users to type and to save documents. The word also has alot of useful tools with TABs such Insert, pagelayout, Design and others. It was developed by Microsoft corporation.

To create shapes in words, these step can be taken;

✓click "insert" at the interphase

✓Then look for "shapes" and select the needed shape.

✓To draw the shape, it should be clicked then drag holding the mouse.

✓after drawing, any modifications can be made, text can be added and lots more.

It should be noted that When creating a shape in Word, some of available options are;

✓adding text to the shape

✓changing the size of the shape

✓changing the location of the shape

8 0
3 years ago
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a devic
ale4655 [162]

Answer: Server

Explanation:

Options include:

A.Laptop

B.Server

C.Game console

D.Workstation

A server is referred to as a computer that helps in the provision of services, data or resources to other systems over a particular network.

Since the game developer wants a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded, the server is the best option for this.

5 0
2 years ago
_______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
Semenov [28]

Answer:

Functional Family Therapy

Explanation:

According to my research on different types of therapies, I can say that based on the information provided within the question the therapy being described in this scenario is called Functional Family Therapy. This is a type of therapy aimed at young teens roughly aged 11-18 who are exhibiting violent or negative behaviors and/or substance abuse. The therapist sits down with the child, their parents, and sometimes an officer of the law in order to get to the root of the problem and come up with different solutions that may help the child feel less angry and prone to act out.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
If the algorithm does not have instructions for unanticipated results, the computer program will a. solve a problem b. start ove
MrMuchimi

Answer: halt, just did the question

6 0
3 years ago
Other questions:
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Elizabeth works for a local restaurant At the end of her shift, she is required
    15·2 answers
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • What does it mean to be self demanding?
    12·1 answer
  • What is the missing line of code?
    10·2 answers
  • 20 points for ez question lol
    9·2 answers
  • An eReader has a 956-pixel x 1290-pixel grayscale display with each pixel able to display 32 shades of gray. What is the KiB siz
    9·1 answer
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!