1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
15

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie

logic bomb denial of service (dos) rootkit
Computers and Technology
1 answer:
lozanna [386]3 years ago
6 0
<span>A rootkit allows a hacker to gain privileged or 'root' access to a computer. A rootkit is designed to actively hide its presence so that the attacker can continue having full access for as long as they need to carry out their intended malicious actions without being detected.</span>
You might be interested in
What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
Dominik [7]
The mother board it holds all of the storage
5 0
3 years ago
Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
Flauer [41]

Answer:

Waist

Explanation:

5 0
3 years ago
If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
chubhunter [2.5K]

Answer: Should be NOT.

Explanation: NAND would make you get emails as long as they don't have both "new" and "advanced." NOR would make you only get emails that don't have "advanced" or "new.| AND would make you only get emails with both "new" and "advanced." XOR would make you get emails as it has either "new" or "advanced," but not if it has neither or both. So NOT new makes sense, because it'll return emails that don't have "new." Hope this helps.

7 0
3 years ago
write a program with total change amount as an integer input and output the change using the fewest coins, one coin type per lin
notka56 [123]

Answer:

Explanationoojhh

8 0
3 years ago
Which of the following describes a BYOD?
Law Incorporation [45]

Answer:

A policy allowing or encouraging employees, contractors, and others to connect their own computers, smartphones, and other devices to their organization's networks.

Explanation:

BYOD - Bring Your Own Device

6 0
3 years ago
Other questions:
  • Which of the following is an example of a problem that could be attributed to poor ergonomics?
    10·1 answer
  • 2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?
    12·2 answers
  • Proper numeric keyboarding technique includes:
    15·1 answer
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • Mario makes a check payable to "cash," intending to withdraw money from his bank. Kirby takes the check from Mario's notebook an
    10·2 answers
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • A type of graph that uses horizontal bars to compare data is called a
    15·2 answers
  • define a function named quarter_num that has one parameter number and return quarter of the number. For example: if we called th
    7·1 answer
  • Which finger presses the Shift key on the keyboard?
    6·2 answers
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!