1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
4 years ago
12

A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever

al weeks ago. Which type of malware is NOT what most likely infected the user's system?
Computers and Technology
1 answer:
Firlakuza [10]4 years ago
8 0

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

You might be interested in
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
snow_tiger [21]

Answer:

The program implemented in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

int lenlist;

vector<int> mylist;

cout<<"Length List: ";

cin>>lenlist;

mylist.push_back(lenlist);

int i =0; int num;

while(i<lenlist){

   cin>>num;

   mylist.push_back(num);  

   i++;

}

int min,max;

cout<<"Min: ";  cin>>min;

cout<<"Max: ";  cin>>max;

cout<<"Output!"<<endl;

for(int i=1; i < mylist.size(); i++){

  if(mylist.at(i)>=min && mylist.at(i)<=max){

      cout<<mylist.at(i)<<" ";

  }

}

  return 0;

}

Explanation:

This declares the length of the list as integer

int lenlist;

This declares an integer vector

vector<int> mylist;

This prompts user for length of the list

cout<<"Length List: ";

This gets input of length of the list from the user

cin>>lenlist;

This pushes user input to the vector

mylist.push_back(lenlist);

int i =0; int num;

The following iteration gets user inputs and pushes them into the vector

<em>while(i<lenlist){ </em>

<em>    cin>>num; </em>

<em>    mylist.push_back(num);  </em>

<em>    i++; </em>

<em>} </em>

This declares min and max variables

int min,max;

This prompts user for the lower bound

cout<<"Min: ";  cin>>min;

This prompts user for the upper bound

cout<<"Max: ";  cin>>max;

The following iteration checks for numbers within the lower and upper bound and print the numbers in that range

<em>cout<<"Output!"<<endl; </em>

<em>for(int i=1; i < mylist.size(); i++){ </em>

<em>   if(mylist.at(i)>=min && mylist.at(i)<=max){ </em>

<em>       cout<<mylist.at(i)<<" "; </em>

<em>   } </em>

<em>} </em>

3 0
3 years ago
Describe at least five ways in which information technology can help students studying subjects other than computing
bija089 [108]

Answer:

yan lang po sana makatulong

5 0
3 years ago
Cual es la funcion del procesador resumen porfa
Arisa [49]

Answer:

todavia necesitas ayuda

7 0
3 years ago
A type of touch screen that can be up to four feet by six feet is a(n) _____. plasma screen multitouch interface Electronic Pape
zlopas [31]
<span>a multi touch interface</span><span />
5 0
3 years ago
Read 2 more answers
One of the reasons that organized crime has been around so long is that it provides goods and services that society wants. A. Tr
Anna11 [10]

The answer would be:

<em><u>A) True</u></em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • Enter the value of 5⋅(13.5−4.5). <br> ​
    5·1 answer
  • Cations - Office 2016 A
    12·2 answers
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • What are ya'll discords???
    10·2 answers
  • Why was it important for the date format to be standardized by the
    7·1 answer
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Which type of malware prevents you from accessing files stored on your computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!