1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
4 years ago
5

____ are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or per

mission and spread—sometimes very rapidly. a. Computer viruses b. Spywares c. Freewares d. Computer worms
Computers and Technology
1 answer:
lakkis [162]4 years ago
6 0

Answer: Computer viruses

Explanation:

Computer viruses are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or permission and spread—sometimes very rapidly. A spyware is also a program that installs itself on a computer without the user's knowledge and tries to collect sensitive information such as passwords, credit card details and sends this information to a remote computer. A computer worm is a type of a virus that replicates itself across different computers. Freeware on the other hand is software that can be obtained for free.

You might be interested in
Consider the following statements: struct supplierType { string name; int supplierID; }; struct paintType { supplierType supplie
Romashka [77]

Answer:

The answer is "supplierType"

Explanation:

Description of the code:

  • In the given program two structure is defined, that is "supplierType and paintType", in which "supplierType" structure two-variable name and "supplierID" is defined, that datatype is "String and integer".
  • In the next step, "paintType" is declared, in which "supplierType" object supplier is created, in which two string variable "color and paintID" are defined, in which "supplierType" data type is supplied.
3 0
3 years ago
A "start transaction" is set to be the system's first screen displayed once you log in to GCSS-Army. Setting up a start transact
ANEK [815]
It is d performed monthly
7 0
3 years ago
The do-while loop is a __________ loop that is ideal in situations where you always want
belka [17]
your answers are all D
4 0
4 years ago
What is a computer meaning
goldenfox [79]

Answer:

computer means an electronic machine which process raw data and gives meaningful information to the user

7 0
3 years ago
Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance
enot [183]
B or D are the options I would suggest.
4 0
3 years ago
Read 2 more answers
Other questions:
  • What natural resources fueled industrialization in the united states?
    14·1 answer
  • What is computer hacking?
    11·2 answers
  • Kevin manages the security for his company and is working to implement a kernel integrity subsystem for key servers. Of the foll
    9·1 answer
  • What is the output of doublec= 12.0 / 5 Systemoutprintln (c)
    8·1 answer
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • What is the best platform for a online meeting?
    10·2 answers
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • I need help ASAP please and thank you!
    14·1 answer
  • Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the stri
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!