1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
4 years ago
5

____ are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or per

mission and spread—sometimes very rapidly. a. Computer viruses b. Spywares c. Freewares d. Computer worms
Computers and Technology
1 answer:
lakkis [162]4 years ago
6 0

Answer: Computer viruses

Explanation:

Computer viruses are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or permission and spread—sometimes very rapidly. A spyware is also a program that installs itself on a computer without the user's knowledge and tries to collect sensitive information such as passwords, credit card details and sends this information to a remote computer. A computer worm is a type of a virus that replicates itself across different computers. Freeware on the other hand is software that can be obtained for free.

You might be interested in
What is an electronic ledger that tracks mathematical data
anyanavicka [17]
Computer or calculater.hope this helps
7 0
3 years ago
A crowd-funding open source business model, called _______, is where users offer money as a reward for new software or new featu
Lana71 [14]

Answer:

bounties        

Explanation:

The bounties are a free or open-source business model for the funding.It is is a payout or bonus which an offered by the community as a bonus or incentive or reward The bounties is offered when someone task to be done by not normally associated with the member or group.

In the software point of you, the bounties are defined as when the user gives a reward in the existing software when some new features are added into that software.  

5 0
3 years ago
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
Directions: Fill in the blank with the correct words that will complete the
Lady bird [3.3K]

Answer:wd bbjuqef vnfoip9

Explanation:

7 0
3 years ago
Most keyboards today are in a
BlackZzzverrR [31]
Qwerty format I think.
6 0
3 years ago
Other questions:
  • Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
    10·1 answer
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Write a C++ program that will ask the user for the name of a data file.
    11·1 answer
  • ______ is data that is entered into a computer. ______ is the result produced by a computer.
    6·1 answer
  • A keyboard shortcut to pasting in a document is to key _____.
    8·1 answer
  • What is the primary purpose of source code editor features such as keyword hi lighting and auto-completion A.to speed up the cod
    7·1 answer
  • A proposal is also known as a
    14·2 answers
  • Explain working principle of computer.​
    5·2 answers
  • Which layer abstracts away the need for any other layers to care about what hardware is in use?
    5·1 answer
  • PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!