1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
15

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call

ed Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Computers and Technology
1 answer:
Elis [28]3 years ago
8 0

Answer:

Trojan horse

Explanation:

Trojan, also known as Trojan horse is a type of malware that ensures that its users are misled of its true purpose. They are a common type of virus and are very dangerous in such a way that they can even hide within other programs that are harmless. Once installed, Trojan will infect every file on your computer and can even steal information or totally infiltrate your system.

You might be interested in
What are the 3 parts of a browser window? What componets are in each?
Helga [31]
Here are the universal symbols: the minus symbol is minimize, the square(s) are for windowed mode, and the X symbol is for closing the browser. Branliest answer here.
7 0
4 years ago
In saving a Visual Basic project properly , which of the following: two components part are involved ?
alina1380 [7]

Answer:

C) Project and Form

Explanation:

In saving a Visual Basic project properly, the following: two components part that is involved are:

1. Project - this is the project file that will be saved in the computer's memory. On the toolbar of a Visual Basic Editor, there is a "Save Project File" icon, which will be clicked to save a Project file.

2. File - the is the Visual Basic Editor's user interface. Just like "window" in Microsoft Office, it is the space used in writing or building the project file.

4 0
3 years ago
Highlights the possible risks and problems that should be addressed during the implementation process
Llana [10]

Answer:

The answer is below

Explanation:

Since the type of Implementation is not stated specifically, it is believed that, the question is talking about ERP Implementation, because it is related to subject in which the question is asked.

Hence, Enterprise Resource Planning (ERP) implementation deals basically, by carrying out installation of the software, transferring of finanancial data over to the new system, configuring application users and processes, and training users on the software

ERP Implementation Risks involve the following:

1. Inefficient Management and Project Activities.

2. Inadequate or No Training and Retraining of Customers or End-Users.

3. Inability to Redesign Business Processes to meet the Software requirements.

3. Incompetent or lack of Technical Support Team and Infrastructure.

4. Incapability to Obtain Full-Time Commitment of Employee.

5. Failure to Recruit and Maintained Qualified Systems, and Developers.

6 0
4 years ago
Application of optical fibre​
densk [106]

Answer:

Internet data transfer.

Explanation:

Optical fibre can be used to move information from one place to another. It is used in internet communications, cable television broadcasting, and telephone communication. One common application is for the transfer of data over the internet. Chances are your browser was able to download this web page by receiving data that came from Brainly's servers, and from my computer, through a fibre optic cable.

4 0
3 years ago
The Healthcare Innovation and Technology Lab would most likely be interested in which of the following app types?
prisoha [69]

Answer:

No. 4: An app to send data from an insulin pump to a data collection point.

Explanation:

Healthcare Innovation and Technology Lab would not mainly be focused with budgeting, book reading, and home insurance policies. Answer number 4 includes health and technology.

7 0
3 years ago
Other questions:
  • What is the disk bandwidth? the total number of bytes transferred total time between the first request for service and the compl
    13·1 answer
  • Which is missing in most areas that do not have Karst topography?
    10·2 answers
  • Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo
    9·1 answer
  • Imagine your friend wants to apply
    5·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    15·1 answer
  • the tool that is used on the form to display text that the user cannot change is a. textbox b. label c. button​
    9·1 answer
  • Techniques that shape material without removing material.​
    6·1 answer
  • 1. Define Validation Rule
    14·1 answer
  • Fast i need now ill give anything
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!