1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
10

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t

argeted IP address.
Computers and Technology
1 answer:
lesantik [10]3 years ago
8 0

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

You might be interested in
To a traditional computer, one means
blagie [28]

a.on , off

In most computer processors, electron movement is controlled by tiny switches that turn this flow of electricity on and off...zero represents off and one represents on

4 0
3 years ago
Which extra step do verizon devices require for fenrir to be allowed to connect to the device?
madam [21]

Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

<h3>What is the Verizon device program?</h3>

The program for device payments: requires you to sign a contract promising to pay for the item in regular installments until the balance is paid. You have the option of paying the gadget off in full at any moment, or you can pay the installments over the course of the entire term.

Instead of paying for your equipment in full up front, Verizon device payment allows you the freedom to upgrade early and spread out your payments over 36 months. Until the full retail price of your item is paid off, you'll make manageable monthly payments.

Differentiation is Verizon's general business approach. Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

To learn more about the Verizon device program refer to:

brainly.com/question/13696647

#SPJ4

8 0
1 year ago
This information is stored in every IP packet to make sure that the packet is eventually discarded if it cannot find the address
Andreas93 [3]

Answer:

TTL

Explanation:

TTL means time -to- live field is a counter that is designed to keep packets from circulating indefinitely in the network case forwarding tables accidentally create cycles. An IP datagram is typically initialized with a TTL of 60 or 64 and the TTL is decremented by one each time it enters a router. If the TTL reaches zero, the router will discard the packet. It is one of the components of the IP datagram

6 0
3 years ago
What legal punishment can people face for plagerism
Maru [420]
They can get a fine.
5 0
3 years ago
7.4.1C The global distribution of computing resources raises issues of equity, access, and power. Briefly describe one of these
nika2105 [10]

It has been accentuated. An organization is a system consisting of: people, material resources and information, being the last, the nerve center of the previous two that allows the survival of these. This statement refers to the most recent conceptions defended by the Information Management (IM), in the sense that organizations should be considered primarily as information systems.

Lynda Woodman's definition of IM states that "management is everything that refers to obtaining the right information, for the right person, at the right price, at the right time and place, to make the right decision."

As for the MIR, part of the assumption of recognition that information is a resource, a value that should be managed like any other, because among the similar characteristics we have:

* acquired at a cost and chargeable in money

* has specific and measurable characteristics

* control of the cost of information,

* has a life cycle,

* ability to be processed and refined, etc.

For Elizabeth Adams "the MIR is a function of top management, to develop a series of policies, programs and procedures to effectively and effectively plan, manage and control the information needs and support resources of information management." In this directive task, the components that participate and the areas in which the person responsible for it must operate are:

1.- information resources: that is, identification, evaluation and use of these, not only internal but also external.

2.- Appropriate technology: to collect, store, retrieve or disseminate information.

3.-management: general planning, human resources, communication, accounting and marketing.

In today's world, there is a tendency to grant special treatment to everything that is related to information; and it is this situation that gives rise to the importance of the management / management of information resources (MIR).

This era of information, characterized as significant changes, flexibility, uncertainty and the "great battles" (for competitiveness, leadership, competition, reduction of uncertainty and risk, etc.), it is necessary to keep updated as soon as to the significant changes that occur in the technology of products and processes, as well as in their management and competitiveness patterns.

We live in an era where the common denominator of progress will be the wise application of information, science and technology, in the production of goods and services for the satisfaction of social needs, as well as the adequate use of resources to increase the wellbeing of society and man. In others, words, we are talking about the correct management of information.

Information management is the new name of the development. Are the professionals (librarians, documentalists) ready to accept the challenge? We believe that information professionals are in an adequate situation, have knowledge, resources, capacity and conditions to maintain a sustainable leadership in the organization of information, but they have to determine what they believe their position should be and fight for it. We must start from the basic criteria, restructure the concept of the information scientist to adapt it to the new, complex and changing needs of the organization and the community.

6 0
3 years ago
Other questions:
  • Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
    8·1 answer
  • By default, which of these traffic source dimensions does google analytics capture for each user that visits your website?
    8·1 answer
  • Often used in connection with a business
    6·1 answer
  • Why is a class called a factory of objects
    11·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • I have a problem with Instagram.
    11·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • HELP THIS IS SO DIFFICULT
    10·2 answers
  • 1. (A) What do you mean by computer? Discuss the use of<br> computer in daily life.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!