1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
7

Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n

etwork is cloaked from the victims, who continue to use their devices as usual and are unaware of illicit activities that may be taking place behind the scenes.
Computers and Technology
1 answer:
Inessa05 [86]3 years ago
7 0

A botnet. It is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. The owner can control the botnet using command and control software.

You might be interested in
I’m so lost. which username do i do.
koban [17]

Answer:

the username you feel like using

5 0
3 years ago
Read 2 more answers
A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer
svlad2 [7]

Answer:

Virtual Machine

Explanation:

<em> I had to look this up, since there were no options from the question. If this is wrong, let me know!</em>

8 0
2 years ago
What are the pros and cons of MP3 audio archives?
UkoKoshka [18]
Was this in reference to literal audio archives? If so, I don't see any cons beside possible copyright infringement.

If you're talking about the codecs themselves, then I can do that.

<span>Pros:

</span>- Widespread acceptance. Supported in nearly all hardware devices, and continually adopted by newer ones.

- Faster decoding. Much more so than FLAC, Vorbis, etc.

- Relaxed licensing schedule.

<span>Cons:
</span><span>
</span>- Lower quality and efficiency than most modern codecs. (To be fair, never really noticed this one).

- Sometimes the maximum bitrate isn't enough.

- Pretty much void/unusable for high definition audio (higher than <span>48kHz).</span>

 
7 0
4 years ago
What types of files we do backup in UNIX and Linux?
katrin [286]

Answer:

Nas ja kaki yawe diy. Kitu mu chuk k a jana a.

Explanation:

Karu explain pudi diya chal puter chuti kar.

8 0
3 years ago
Read 2 more answers
The ram called a volatile device select one:<br><br> a. false<br><br> b. true
Paraphin [41]
B. true

RAM (Random Access Memory) is volatile because if power is lost, so is your memory.
6 0
3 years ago
Other questions:
  • What is a Limited Purpose credit card
    11·2 answers
  • Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several
    9·1 answer
  • You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as yo
    15·1 answer
  • What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
    9·1 answer
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • The Brinley website will not let me search for questions anymore. It says “Search all you want in-app” and then covers the quest
    14·1 answer
  • Please hurry
    15·2 answers
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
    13·1 answer
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!