1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
15

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie

logic bomb denial of service (dos) rootkit
Computers and Technology
1 answer:
lozanna [386]3 years ago
6 0
<span>A rootkit allows a hacker to gain privileged or 'root' access to a computer. A rootkit is designed to actively hide its presence so that the attacker can continue having full access for as long as they need to carry out their intended malicious actions without being detected.</span>
You might be interested in
To save your new document or presentation, click the Start Button
Vika [28.1K]
No you would click save or save as
3 0
3 years ago
How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
marshall27 [118]
It can help you develop your leadership trait
5 0
3 years ago
Read 2 more answers
File "f2" has a size of 2. Why? A. It contains the string "f1". B. It contains two blank lines.
Aneli [31]

Answer:

A. It contains the string "f1"

7 0
3 years ago
What is RAM and ROM​
Aleonysh [2.5K]

Answer:

Read-only memory, or ROM, is a form of data storage in computers and other electronic devices that can not be easily altered or reprogrammed. RAM is referred to as volatile memory and is lost when the power is turned off whereas ROM in non-volatile and the contents are retained even after the power is switched off.

8 0
3 years ago
Read 2 more answers
Which are three possible text formatting actions in wordpad?
DaniilM [7]

Answer:

Font, Bold, italic, colored, centered text...

7 0
3 years ago
Other questions:
  • How do u determine the voltage across diode
    15·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • Select the correct answer.
    6·2 answers
  • Importing data is sending data to a new file.Is this true or false
    10·2 answers
  • Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a fo
    11·1 answer
  • Which of the following is a change that will not affect the pressure in a container?
    9·2 answers
  • Android OS "AFTER" Alpha.<br><br> A. Bubblegum<br><br> B. Beta<br><br> C. Berry<br><br> D. Buzz Cola
    10·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • ....................................................................................................
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!