1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
4 years ago
12

A trojan horse

Computers and Technology
1 answer:
svp [43]4 years ago
6 0
A trojan horse is software that appears to be benign but does something other than expected.
You might be interested in
Frank listed the steps for attaching a file to an e-mail. Step 1: Create the message. Step 2: Click Attach File in the Include g
Leya [2.2K]
Step 1: Create the message was frank's error in sending a file to an e-mail. This is because, when sending a copy of an e-mail the sender must make sure to input the e-mail address of the receiver on the top of the message box. This way the sender will be sure to submit his attachment to the receiver properly.
5 0
4 years ago
Read 2 more answers
What technological invention allowed for the prevalence of automation
julsineya [31]
The automated flour mill created by Oliver Evans in the mid-1780’s?
8 0
3 years ago
Read 2 more answers
Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
lyudmila [28]

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

7 0
3 years ago
Which items make up the stamen of a flower? Stigma, style, filament, anther, ovule.
d1i1m1o1n [39]
Anther and Filament
hope his helped ;)
5 0
4 years ago
Define types of hacker ? with three to four line of each types?​
Strike441 [17]
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
5 0
3 years ago
Other questions:
  • In presentation software, what is the area that displays behind the information you place on a slide?
    5·1 answer
  • How many nibbles are in 18 bytes??
    5·1 answer
  • Samuel is working on decimal and binary conversion for his college project. He is using the binary number 111011 and wants to ex
    14·1 answer
  • You are driving in the right lane of a municipal road the road has three lanes in your direction ahead of you in the lane to you
    14·2 answers
  • The price elasticity of demand for mobile phones a. will be higher if there is an improvement in the production technology. b. w
    14·1 answer
  • The Fibonacci sequence {fib}i≥1 is defined recursively as follows: fib(1) = 1, fib(2) = 1 and, fib(n) = fib(n-1) + fib(n-2) for
    13·1 answer
  • What are motion graphics?
    9·1 answer
  • How is communication within healthcare different than communication within other industries ?
    13·1 answer
  • Write a complete c++ program using function and array.​
    6·1 answer
  • Need help with Python coding from Zybooks...
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!