1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
10

6. Which of the following is malware? (1 point)

Computers and Technology
2 answers:
pshichka [43]3 years ago
8 0

6: Malware is software (like viruses) designed to damage or harm your device.

7: What Sosa did to violate HBO®'s copyright laws was that he recorded and sold episodes of G.O.T. and sold them online.

lubasha [3.4K]3 years ago
5 0
Software to damage computers
You might be interested in
The one who will defeat me in this typing race I will mark the one brainliest:
fredd [130]

Answer:

yes

Explanation:

can you send the link....

5 0
3 years ago
Read 2 more answers
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
Which of the following is an example of an application software?
pishuonlain [190]
Word processing software
6 0
3 years ago
Explain program and programming with two examples of each<br>Help​
evablogger [386]

Answer:

program (noun) is executable software that runs on a computer. ... Examples of programs include Web browsers, word processors, e-mail clients, video games, and system utilities. These programs are often called applications, which can be used synonymously with "software programs." On Windows, programs typically have an .

7 0
3 years ago
Need help with these
kolbaska11 [484]
The first one is d the second one is true the third one is false
3 0
3 years ago
Other questions:
  • What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
    6·1 answer
  • Activity 1: Matched pairs or independent/separate samples? For each of the prompts below, decide whether the parameter of intere
    11·1 answer
  • Look at the following Python code:
    11·1 answer
  • Which files track internet usage and personal information when people visit websites?
    14·2 answers
  • Radio and television are examples of
    9·1 answer
  • How are online sources used? Check all that apply.
    8·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
  • Select the correct answer..
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!