1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
14

Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant

ivirus software loads?
Computers and Technology
1 answer:
Ber [7]3 years ago
5 0
I believe it is referred to as 'rootkit'
You might be interested in
It is possible to play older console games such as those written for the nintendo game boy or sega genesis on a personal compute
timurjin [86]
Emulator««««that is the answer
5 0
3 years ago
Question 7<br> What is the description of The Ribbon?
Aloiza [94]

Answer:

a flat or tubular narrow closely woven fabric (as of silk or rayon) used for trimmings or knitting. b : a narrow fabric used for tying packages. c : a piece of usually multicolored ribbon worn as a military decoration or in place of a medal. d : a strip of colored satin given for winning a place in a competition

7 0
2 years ago
Which storage con be used<br>as permanent storage<br>a) Rom<br>6) RAM, © main memery​
Veseljchak [2.6K]

Answer:

ROM

Explanation:

Data in ROM does not erase itself when the computer is shut down. The data is permentely written and stored.

4 0
2 years ago
The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA.
Mars2501 [29]

Answer:

True

Explanation:

A Domain Name Service comprises of computer servers that carries a database of public IP addresses and their related human-readable domain names/hostnames, it receives query as hostnames and helps to translates those human-readable domain names/hostnames into IP addresses that computers and routers understand.

5 0
3 years ago
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a
irakobra [83]

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

6 0
3 years ago
Other questions:
  • Arrange these stages of website design in the order that they follow. developing planning learning designing testing and deliver
    12·1 answer
  • A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
    9·2 answers
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
    12·1 answer
  • PLEASE HELP!!!!! (Environmental Science Semester 1)
    7·2 answers
  • Calculator and clocks are examples of -------------- in windows 7
    14·1 answer
  • Web designers use programming languages to write websites. A True <br> B False​
    15·2 answers
  • The __________ statement allows you to check for
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!