1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
4 years ago
5

What type of system security malware allows for access to a computer, program, or service without authorization?

Computers and Technology
1 answer:
olasank [31]4 years ago
7 0

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
You might be interested in
Susan needs to use a lookup function to find an exact match of an inventory item, so she will set the range_lookup value to ____
Hitman42 [59]
<span>Susan needs to use a lookup function to find an exact match of an inventory item, so she will set the range_lookup value to false. 

Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions here.
</span>
5 0
3 years ago
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
4 years ago
Fourth-generation languages are commonly used to access ____
Nesterboy [21]
Databases use fourth-generation languages in order to access its contents. These fourth-generation programming languages are widely used in database managing. It was designed to have a more specific use in contrast to the commonly used 3G languages at that time. 
6 0
3 years ago
*Sometimes it is difficult to convince top management to commit funds to develop and implement a SIS why*
ziro4ka [17]

Step-by-step Explanation:

SIS stands for: The Student Information System (SIS).

This system (a secure, web-based accessible by students, parents and staff) supports all aspects of a student’s educational experience, and other information. Examples are academic programs, test grades, health information, scheduling, etc.

It is difficult to convince top management to commit funds to develop and implement SIS, this can be due to a thousand reasons.

The obvious is that the management don't see the need for it. They would rather have students go through the educational process the same way they did. Perhaps, they just don't trust the whole process, they feel more in-charge while using a manual process.

4 0
3 years ago
Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
QveST [7]

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

8 0
3 years ago
Other questions:
  • What does confidentiality of data refer to?
    6·2 answers
  • The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
    9·1 answer
  • How to attach a picture on brainily?
    8·1 answer
  • Can java scanner not take in a negative input?
    11·1 answer
  • The _____ handles the instructions for your computer to start up before the operating system is loaded.
    11·1 answer
  • MSSQL
    10·1 answer
  • Write a short program that uses a for loop to populate an array. The array can store up to 10 integers. Modify the code slightly
    12·1 answer
  • Which is a primary document?<br> a. letter<br> b. dictionary<br> c. textbook<br> d. website
    11·1 answer
  • A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 re
    5·1 answer
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!