1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
4 years ago
8

A Trojan horse: installs spyware on users' computers.

Computers and Technology
1 answer:
scZoUnD [109]4 years ago
8 0

Answer:

b. A Trojan horse is a software that appears to be benign but does something other than expected.      

Explanation:

  • A Trojan horse is not a virus because it does not replicate itself but this is a software that can act as dangerous as the virus does in damaging a computer.
  • It appears to be harmless but when such a software is installed into the computer it affects other files resulting in damaging the computer and making the system to crash.
  • It can make way for other malware to enter a computer and can slow down the activities of a computer and can make hackers control the computer remotely.
  • Trojan horse can be installed into the computer clicking on an email attachment or a link in the email which might install a malicious software on the computer, or downloading an application or software that seem harmless but can affect the computer.
You might be interested in
Technological developments over the past two decades, such as the rise of the internet and email, have
enyata [817]
Change our live because....
7 0
4 years ago
Read 2 more answers
The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction whi
lora16 [44]

Answer:

repeats an instruction while the Zero flag is set

Explanation:

hope this helps you :)

6 0
4 years ago
Read 2 more answers
29
denis23 [38]

The correct answer is A it transfers control to the next loop in the program.


The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.


3 0
3 years ago
Which three major objects are built into the JavaScript language?
Marizza181 [45]

Answer:

jddjjddjdjdjjsjsjejejejjejejejjdjdjeje

3 0
3 years ago
Read 2 more answers
Which of the following is NOT correct concerning database design?
Alborosie

1 is not correct.

Hope this helps!

5 0
4 years ago
Other questions:
  • Wich is the last step in conducting a URL search
    14·2 answers
  • What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
    12·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • Write a Student class in Java which has a name, id_number, year (e.g. 2) and
    9·1 answer
  • Convert to binary 140
    12·1 answer
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • When you go to a website, your web browser requests a web page from:
    11·1 answer
  • ¿Qué diferencia existe entre un virus biológico y virus informático?
    12·1 answer
  • You are asked to write a program that will display a letter that corresponds with a numeric rating system. The program should us
    7·1 answer
  • Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!