1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

A piece of malicious code uses dictionary attacks against computers to gain access to administrative accounts. The code then lin

ks compromised computers together for the purpose of receiving remote commands. What term best applies
to this malicious code?
A. Exploit
B. Botnet
C. Logic bomb
D. Backdoor
Computers and Technology
1 answer:
stira [4]3 years ago
8 0

Answer:

B) Botnet

Explanation:

A botnet  applies to  a number of Internet-connected devices (computers), they are majorly used to perform distributed denial-of-service attack, steal data, send spam, and allows the attacker to access the devices and computers and its connection. the scenario described in the questions describes a typical BOTNET.

You might be interested in
How to make a slideshow out of pictures in a folder windows not fitting to screen?
weqwewe [10]

Answer:

Windows slideshow.

Explanation:

Creating or displaying a collection of images in a windows file can be very ecstatic and it is quite possible using third party applications.

One way of creating a slideshow is using the screensaver desktop option. There are other easy ways like the wallpaper option and using powerpoint presentation.

To using the screensaver option, go to windows settings and click on personalize, here, use can select a theme or a group of image files, click on a color theme and click apply.

8 0
4 years ago
25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
Alexxx [7]
15
12
19.8 cool cool cool
7 0
2 years ago
Is anyone else's pa.dl.et not working??? It says The requested URL / was not found on this server. That’s all we know.
hram777 [196]

Don't worry about it

that's happening to other people not just you

i pretty sure it might take a hour or maybe longer for it to start working again

7 0
3 years ago
Which wireless communication is typically limited to six feet of distance?
Tcecarenko [31]

Answer:

Bluetooth is a wireless communication    is  typically limited to   six feet distances

Explanation:

Bluetooth is one type of communication maximum it covers  10 meters to 30 meters.   but it is one to one communication made for data transactions.  After  25 meters of coverage on communication will be very slow on data transactions. But Bluetooth has also had a limitation.

IR.  It is one of communication where infrared technology used. It is like face to face communication and speed of data transaction limited and it is also one to one communication made for data transactions. Communication paired and covered very little distances.

NFC it is chip-based and covers very little in fact just to device meet each and communication started. And very it caries very little data during the data transactions. it is also one to one communication made for data transactions

RFID is one of communication and it is powerful to cover more areas with multiple connections at the same time. It has a limitation  in distance and it covers  like a net with a specific distance  

4 0
3 years ago
Identify the components of documents merging
Lena [83]
There are 3 components of documents merging :

- input 1  , which contain the data source

- Input 2, which contain the main document

and

- Output 3, which contained the merged the documents
8 0
3 years ago
Other questions:
  • Which feature is a component of a database application?
    7·1 answer
  • PLEASE HELP!!!!!!!!!!!
    11·2 answers
  • Write a statement that declares a PrintWriter reference variable named output and initializes it to a reference to a newly creat
    5·1 answer
  • Create a class called Home that contains 4 pieces of information as instance variables: county (datatype string), street (dataty
    5·1 answer
  • Which allows for saving a setting on one device and having the setting synchronize to other devices? Choose two answers.
    12·1 answer
  • Which is a primary document?<br> a. letter<br> b. dictionary<br> c. textbook<br> d. website
    11·1 answer
  • Can someone please help me
    11·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • What is the definition of shape
    14·2 answers
  • If the following are using default subnet masks, which one(s) of the following are valid node ip addresses: (select one) a) 220.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!