1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
4 years ago
12

A trojan horse

Computers and Technology
1 answer:
svp [43]4 years ago
6 0
A trojan horse is software that appears to be benign but does something other than expected.
You might be interested in
Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
sasho [114]

Answer:

Speech synthesis or text-to-speech (TTS) program

Explanation:

A speech synthesis program is a program can convert a written text to audio. The program can recognize the text and present it in audio format with a human voice. Speech synthesis program can be found in Microsoft Word. We can go Review tab and find the "Read Aloud" option. We can selectively highlight the text in Word and click "Read Aloud". This will trigger the text-to-speech conversion process and produce the audio output of the highlighted text in human voice.

3 0
3 years ago
A look to different section of the same page is known as_____.
11Alexandr11 [23.1K]

Answer:

hatdoggggggggg

Explanation:

sunoggggggg

6 0
3 years ago
Given an array declared to hold 100 values, the smallest index that can be used with the array is
Aneli [31]
In C influenced languages - 0.
8 0
3 years ago
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to
STatiana [176]
Things! :D :D :D :D :D
5 0
3 years ago
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
Other questions:
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing
    15·2 answers
  • Which of the following is not a main function within end user support?
    13·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • The number of bits that can be transferred per second over a given transmission medium.
    6·1 answer
  • Cual es la definición de grouded?​
    7·1 answer
  • When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by st
    13·1 answer
  • Running away from home
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!