1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
4 years ago
4

Which of the following describes programs that can run independently travel from system to system and disrupt computer communica

tion?A. VirusesB. WormC. TrojansD. Droppers
Computers and Technology
1 answer:
avanturin [10]4 years ago
5 0

Answer:

B. Worm

Explanation:

Worms, which is a form of malware that affects computers, and is similar to computer viruses. However, the most striking difference is that it can cause damage without a host file/program/software or even without the help of a computer user.

Hence, WORM is what perfectly describes programs that can run independently and travel from system to system and disrupt computer communication.

You might be interested in
When declaring the data type for a multidimensional array of strings, which statement would be most appropriate?
romanna [79]

Answer:

This question required option (See Explanation)

Explanation:

Required

How to declare 2D array

Using Java as a programming language of reference, the syntax to declare a 2D array is:

Data-Type [][] Array-Name = new Data-Type[Rows][Column]

From the question, the data type is String. So, the syntax becomes

String [][] Array-Name = new String[Rows][Column]

Assume the array name is: myArray; The above becomes

String [][] myArray= new String[Rows][Column]

<em>I will not assume values for Rows and Column, but it is worth saying that Rows and Columns are positive integers greater than 1 to make the array a 2 D array</em>

4 0
3 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
IBM’s system that is built on the middle ground approach to AI.
Norma-Jean [14]

Answer:

IBM Watson is AI for business. Watson helps organizations predict future outcomes, automate complex processes, and optimize employees' time.

Explanation:

6 0
3 years ago
I need answer pooooooo​
lara [203]
Read the instructions right, youll get ir done
7 0
3 years ago
Which reports indicate how traffic arrived at a website?
umka21 [38]

Answer: All traffic reports indicate how traffic arrived at a website.

Explanation:

5 0
3 years ago
Other questions:
  • Write a program that takes as input an arithmetic expression followed by a semicolon ";". The program outputs whether the expres
    11·1 answer
  • What is authentication?
    8·1 answer
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • If you have a rubric, “your teacher can prove you knew what you were supposed to do.” T/F
    10·2 answers
  • Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
    6·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • Consider a Rational class designed to represent rational numbers as a pair of ints, along with methods reduce (to reduce the rat
    10·1 answer
  • The formula =B2/A2 is inserted into cell C2. Which of the following is true when this formula is copied and pasted into cell C3?
    6·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • Anyone know how to do Calculator program in python ?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!