1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
10

6. Which of the following is malware? (1 point)

Computers and Technology
2 answers:
pshichka [43]3 years ago
8 0

6: Malware is software (like viruses) designed to damage or harm your device.

7: What Sosa did to violate HBO®'s copyright laws was that he recorded and sold episodes of G.O.T. and sold them online.

lubasha [3.4K]3 years ago
5 0
Software to damage computers
You might be interested in
Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.
zhuklara [117]

Answer:https://www.chegg.com/homework-help/questions-and-answers/program-specifications-write-program-play-automated-game-rock-paper-scissors-two-players-m-q84530098

3 0
2 years ago
List out 20 output devices ​
GaryK [48]

Answer:

20 Examples Output Devices

Monitor.

Printer.

Audio Speakers.

Headphones.

Projector.

GPS.

Sound Card.

Video Card.

7 0
2 years ago
Read 2 more answers
What is motherboard ?​
PtichkaEL [24]

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals

4 0
2 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Meryll is thinking of creating a painting of a historical site. She has seen a similar painting put up online by another artist.
san4es73 [151]
I believe its c, the third option 
3 0
3 years ago
Other questions:
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud.
    13·1 answer
  • BRAINLIEST!!! 20 PNTS!!!! HELPP!!!
    12·1 answer
  • How many 1000-Watt lights can be plugged into a standard 120-Volt, 15-Amp outlet? (Hint: W/V=A) *
    7·1 answer
  • Joe has just started the Security Module. He wants to get through it as quickly as possible and take the Quiz. As he clicks thro
    11·1 answer
  • Binary is best interpreted by a computer because ​
    12·2 answers
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
  • List seven media features that can be used in media queries.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!