1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
10

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t

argeted IP address.
Computers and Technology
1 answer:
lesantik [10]3 years ago
8 0

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

You might be interested in
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
Norman Bates has a very unusual hobby what is it?
Allushta [10]

Answer:

<h3>Norman only likes to stuff birds, not other animals.</h3>
8 0
3 years ago
Which of the following is an example of batch processing?
9966 [12]

Answer:

several personnel accessing the registration system

Explanation:

batch processing is all about multiprogramming so I think the first answer is the best as it is not based on one person .I know the last answer might be almost close but on a closer look it is not the answer as it is single based as written a file

7 0
3 years ago
Which computer are used by mobile employees such as meter readers.​
Naily [24]

Answer:

Handheld/Mobile Computers

3 0
3 years ago
Read 2 more answers
Other questions:
  • Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
    9·1 answer
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • Design a new Triangle class that extends the abstract
    13·1 answer
  • What do developers do to support software products? explain to users which development process model was used to make the produc
    8·1 answer
  • Hey guys. Can u help me pls? I need to add number1 and number2 together on Python, I don't know what I'm doing wrong. Thx for yo
    7·2 answers
  • What should be used to keep a tablet dry?
    13·1 answer
  • in java how do i Write a Java program that takes ten numbers as input to calculate and print the average of the numbers.
    11·1 answer
  • A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,
    13·1 answer
  • What is the viewport?
    5·1 answer
  • What is an example of a recent development in technology
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!