1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
5

Select the correct answer.

Computers and Technology
2 answers:
prisoha [69]3 years ago
8 0

Answer:

I believe it is either, C: Spyware, or D: Worms.

Explanation:

Some Worms can spread on a network, causing bandwidth to be consumed.

alukav5142 [94]3 years ago
3 0

Answer:

Worms ( D )

Explanation:

Worms in computer systems spread over the system by taking advantages of the operating system of the computer they found themselves because most operating system have some vulnerabilities.

These worms which are a type of malware affects the computer systems by overloading the servers and consuming more than necessary bandwidth from the network it is found.

worms sometimes contain payloads which might damage the computers in which they are found. spyware causes the slow loading/running of system operations because it is a malware that hogs system resources.

You might be interested in
Explain why the local disc of a computer start from C and not A​
natima [27]

Answer:

In older times, A and B drives were reserved for floppy disks or tapes. This is why C and subsequent letters are for used hard/other drives

Explanation:

7 0
3 years ago
What does a computer user need to know about programming in order to play a video game?
natita [175]

They don't need to know anything, because the video game is programmed by the person who made the game. You don't need to do any programming to play.

8 0
3 years ago
Read 2 more answers
Discuss two things you want to know about driving
Zigmanuir [339]

always stay on the right side

never text and drive


3 0
3 years ago
Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
Nana76 [90]

Answer:I would need more information to help you ut, sorry

Explanation:

6 0
3 years ago
My uh coding teacher would like the class to do little piggy with code.
Digiron [165]

Answer:

see picture below

Explanation:

I added a parameter to factor out the first bit of each sentence into a global variable. If you change for example 'pig' into 'monkey', all sentences will change.

4 0
3 years ago
Other questions:
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Ma
    9·1 answer
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • What the best option if you cant show your PowerPoint presentation at all
    6·2 answers
  • The WAN connections to your regional offices are unfortunately extremely slow for your users and they are complaining about file
    14·1 answer
  • How to post a answer
    7·1 answer
  • Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and
    9·1 answer
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!