1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
11

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa

y a computer operates, and that can replicate itself to infect any new media it has access to.
Computers and Technology
1 answer:
g100num [7]3 years ago
8 0
That would be a virus.
You might be interested in
RAM IS often referred
miss Akunina [59]
3

thank me later :))))))))
7 0
3 years ago
how do i turn off itallics on a school chromebook i accidentally turned them on in another tab and i dont know how to undo them
Rudiy27
U go in to the bar with i b u the is italics and u press it again and it will turn it off but u have to have the text selected
5 0
2 years ago
Microsoft acknowledged that if you type a res:// url (a microsoft-devised type of url) which is longer than ____ characters in i
cluponka [151]
Which is longer than 20 characters
5 0
3 years ago
Give two reasons why it is not advisable to open email from unknown sources​
sattari [20]

Answer:

1. It might give your device a malicious virus or can grab your ip, so it isn't a good idea to open unknown websites. Always go to safe webs!

2. It might be a scam, let's say it is for a free iphone and you put your info in. It's a win-lose thing.

Explanation:

6 0
3 years ago
Read 2 more answers
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
Other questions:
  • What is the function of the keyboard shortcut Ctrl+Shift+E in a word processor
    5·2 answers
  • I WILL MARK BRAINLIEST PLZ HELP
    5·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • In Web design, What kind of tag is referred to as fixed ?<br>​
    7·1 answer
  • Define a romanNumberToInt function that converts a RomanNumber value, which is a list of Roman digits, into an integer. Hints: -
    7·1 answer
  • Instead of terminating the series, the producers decided to extend it for an additional season. In the sentence above, which of
    13·1 answer
  • Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
    9·1 answer
  • What your favorite video game? (Put your user if you wanna play!)
    9·2 answers
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!