1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
7

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste

ms are commonly referred to as ________
Computers and Technology
1 answer:
Galina-37 [17]3 years ago
6 0

Answer:

Malware

Explanation:

malware is used to disrupt computer operation, gather personal info, and or gain access to private computer systems.

You might be interested in
Match each with the correct answer.
natta225 [31]

Answer:

1. E

2. C

3. F

4. D

5. A

6. B

Explanation:

CPU: this is known as the central processing unit and it is considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

A. Decode unit: decodes instructions and data and transmits the data to other areas in an understandable format.

B. Register unit: contains many separate, smaller storage units. Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.

C. Bus unit: it is used to connect all the other major components together, accepts data, and sends data through the input and output bus sections.

D. Control unit: control of the overall operations of the CPU. The component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit how to respond to informations sent to the processor.

E. Arithmetic logic unit (ALU): performs mathematical functions on data stored in the register area.

F. Cache: small temporary memory area that separates and stores income data and instructions.

8 0
3 years ago
Please help me with these short questions >..
Thepotemich [5.8K]

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

6 0
3 years ago
Which of the following is included in the professional career pathway
Inessa [10]
Meteorologist and Day care owner
3 0
3 years ago
Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
Luda [366]
As far as I remember, message-digest functions distill the information contained within a file (small or large) into a single fixed-length<span>number, typically between 128 and 256 bits in length. This function is designed to protect the integrity of a piece of data to define changes to any part of a message.</span>
7 0
4 years ago
3 ways to get home safe if there's drugs in your system
almond37 [142]
Dont drive so ask a friend to drive you home
3 0
3 years ago
Other questions:
  • Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort
    13·1 answer
  • Hardware- The ______________ equipment that makes up the computer.
    6·1 answer
  • Hannah weighs 210 pounds using the English System of measurement. If we convert her weight to the Metric System, she would weigh
    14·1 answer
  • What should an administrator use to more easily assign database access permissions to multiple users?
    6·1 answer
  • 20. A computer freezes at odd times. At first, you suspected the power supply or overheating, but you have eliminated overheatin
    6·1 answer
  • Select the correct text in the passage.
    6·1 answer
  • In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
    15·1 answer
  • Help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!​
    9·1 answer
  • Explain how principles of computer programming are applied in different languages to produce
    5·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!