1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
5

The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q

uestion 12 options:
Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
3 0
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

You might be interested in
Which of the following sorting algorithms is described by this text? "Take the item at index 1 and see if it is in order compare
trasher [3.6K]

Answer:

b. selection sort

b. 8 11 17 30 20 25

Explanation:

The options above are the correct answers to the given questions.

Selection sort is a simple comparison-based sorting algorithm.

selection sort. (algorithm) Definition: A sort algorithm that repeatedly searches remaining items to find the least one and moves it to its final location. The run time is Θ(n²), where n is the number of elements. The number of swaps is O(n).

It is this sorting algorithm that will best ne suitable in the given event.

7 0
3 years ago
Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol
Maru [420]

Answer:

A. Information MIS infrastructure

Explanation:

An Information MIS infrastructure supports how important information is maintained and secured in an organization. It also supports the day to day operations of an organization, in this case, which includes maintaining payroll and vacation records, employment histories, and benefits information. Information MIS infrastructure also provides measures for backup and disaster recovery plans and the business continuity plan. On the other hand, Agile MIS infrastructure supports change within an organization's business processes while sustainable MIS infrastructure refers to the sustainable use and disposal of technology in an environmentally friendly manner.

6 0
3 years ago
Presentations are used to communicate______ or to help persuade someone of a new idea. A good presentation will contain a mix of
kvv77 [185]
Just quizlet it believe me it will help 100%
7 0
3 years ago
Question:
Vlad1618 [11]

Answer:

The file type that uses equations instead of pixels are D.EPS or vector files

Explanation:

3 0
3 years ago
If you enter a command and want to terminate its execution before it is finished, you can press ____ to do so.
sertanlavr [38]
If you mean on the phone you can press the home button. if you mean on the computer you could press esc
5 0
3 years ago
Read 2 more answers
Other questions:
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • What difference between plagiarism and fair use?
    14·1 answer
  • Why are computer messages encapsulated?
    13·1 answer
  • 6. While using the HTS, ________________ will help maintain a safe driving environment despite high speeds and a large number of
    12·1 answer
  • How do companies use LinkedIn ?
    7·2 answers
  • If you have configured your prompt so that it does not show your working directory, you can use the ____ command to verify in wh
    15·1 answer
  • Write a computer program that determines how many grades are between 0 and 19.
    8·1 answer
  • Please help ASAP!
    15·1 answer
  • Overview In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for
    7·1 answer
  • Hãy mô tả mô hình xử lý của hệ thống thông <br> tin kế toán tài chính trong một doanh nghiệp
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!