1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
7

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste

ms are commonly referred to as ________
Computers and Technology
1 answer:
Galina-37 [17]3 years ago
6 0

Answer:

Malware

Explanation:

malware is used to disrupt computer operation, gather personal info, and or gain access to private computer systems.

You might be interested in
Write the following abbreviations in full next to the question number
kow [346]

Answer:

<u>1.2.1 CPU</u>

Central Processing Unit

<u>1.2.2 RAM</u>

Random Access Memory

<u>1.2.3 HDD</u>

Hard Disk Drive

<u>1.2.4 MB</u>

Megabyte

<u>1.2.5 OS</u>

Operating System

<em>Hope this helps! ^-^</em>

<em>-Isa </em>

7 0
3 years ago
The presentation ____ determines the formatting characteristics of fonts and colors.
leonid [27]
The presentation theme determines the formatting characteristics of fonts and colors.
6 0
4 years ago
Read 2 more answers
Karen is learning about searching the Internet and collaborating with other people online. ​ ​ Karen has found and removed all W
Andreyy89

Answer:

She should:

Make sure they are well-known.

Understand if they are safe or not.

Be able to find out if it is a phony website.

Find out as much as she can about the website first.

Explanation:

1. If they r not well-known they could be fake and steal personal/private info from you.

2. If they r not safe they could put her in danger if she gives out private info like her address.

3. If it is a phony website it would be a waste of time.

4. Finding out as much as possible from the website is important so that she can make sure it fits her needs and does not hide anything from her.

8 0
3 years ago
Anyone know how to do point hack​
skelet666 [1.2K]

Answer:

No

Explanation:

yes maybe sure look up

5 0
3 years ago
Read 2 more answers
A simple way to think of the Excel application is as a giant ______.
Naddik [55]
Spreadsheet ......zzzzzz
8 0
3 years ago
Read 2 more answers
Other questions:
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • What are the flowchart symbols?​
    6·1 answer
  • Which of these is a major mobile game developer?
    9·1 answer
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • Q2. What does JSON stand for? Can you give an example of a JSON object. Q3. What is the purpose of a "projection" in a find quer
    10·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
  • Can someone please do this java lab for me (100 point version)? Im really having trouble. (DO NOT GIVE FAKE, USELESS ANSWERS. I
    14·1 answer
  • Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    9·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
  • What type pf physical security devices lets a company locate devices that have been moved to a new location?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!