1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
7

A computer program that senses when another computer is attempting to scan or access a computer or network is called an

Computers and Technology
1 answer:
astra-53 [7]3 years ago
4 0
Anti-spyware, spyware is used to monitor others peoples electronic devices and can also be used to take remote control of them as well. Anti-spyware will usually detect and even try to destroy the spyware.
You might be interested in
Posts that you delete
kiruha [24]
Answer
are visible to others may already have been shared
8 0
2 years ago
30 POINTS!!
bulgar [2K]

Answer:

online

the answer is online

7 0
3 years ago
How could you insert a new row between rows 20 and 21?
podryga [215]
Highlight the row(20), then click on the insert cells button under the home ribbon.
3 0
3 years ago
Read 2 more answers
20 points for ez question lol
slega [8]
I think it might be the third on not certain
5 0
3 years ago
Read 2 more answers
What are three special purpose devices you might find in a data center and what do they do?
Alinara [238K]
The <span>three special purpose devices one might find in a data center and what they do are : 
</span><span>1) Load Balancer</span><span> is a device that acts as a reverse proxy and distributes network or application traffic across a number of. servers.</span><span>
2) Logical Servers are logically separate servers (e.g., a Web server, an email server, and a file server) on the same physical computer. 
</span>3) V<span>irtual Servers ran on the same physical computer </span>that shares hardware and software resources with other operating systems (OS), they are popular in Web hosting environments.
6 0
3 years ago
Other questions:
  • Which of the following is not a standard method called as partof the JSP life cycle?
    5·1 answer
  • Who usually signs a collection letter?
    15·2 answers
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • What is one way to measure technological progress?
    5·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • What type of device is the keyboard?<br><br> Output<br> Input<br> Monitoring<br> Software
    7·2 answers
  • The four general functions of any application program are: data storage, data access logic, application logic and presentation l
    11·1 answer
  • What is a software? 2 sentences please, I'll mark u as brailiest
    12·1 answer
  • How to assign some object key values to other name react const.
    7·1 answer
  • Fiscal policy includes each of the following except? 1) the money supply. 2) taxes. 3) government spending. 4) the automatic sta
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!