1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
10

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t

argeted IP address.
Computers and Technology
1 answer:
lesantik [10]3 years ago
8 0

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

You might be interested in
During Iteration planning, the PO introduces multiple new stories to the team. After a lot of discussion, the team decides to in
netineya [11]

Answer:

The answer is "Option d".

Explanation:

The Iteration Management is also an activity in which all members of the team will determine how many the backlog team will allocate towards the next Iteration, and each team wraps up the work only as a group of determined iteration targets. in the given question the "choice d" is correct because The plans to achieve without training entered PO or design staff and requirements have not even been identified, and the wrong choice can be defined as follows:

  • In choice A, T' he PO doesn't give the story detail, that's why it's incorrect.    
  • In choice B,  the doesn't a team left the past for more refining with the PO in the Project Backlog, that's why it's incorrect.  
  • In choice C, The Development Team has not found some other team dependency, that's why it's incorrect.

4 0
3 years ago
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
The 16 broad career options developed by the US department of education are called
In-s [12.5K]
The answer is career clusters. 
6 0
3 years ago
AP CSA help needed. Java please.
leva [86]
#include using namespace std;int main(){int year = 12,value = 10,total = 0;do{year++;value *= 2;total += value;}while(value*2 < 1000);cout << "Age: " << year << endl;cout << "Last gift: " << value << endl;cout << "Total: " << total << endl;cin.get();return 0;
5 0
2 years ago
Please help with this coding problem! Any help is greatly appreciated!!
Nonamiya [84]

The python program is an illustration of python functions; Functions are names statements that are executed when called.

<h3>The order in which the statements are executed?</h3>

The program uses functions, and the functions would be executed when called.

So, the order of the statements is:

  • Line 10
  • Line 11
  • Line 1 to 3
  • Line 12
  • Line 4 to 6
  • Line 13
  • Line 7 to 9
  • Line 14

<h3>The value of x in between lines 11 and 12</h3>

On line 11, the function F(n) is called and executed.

This function multiplies 10 by 5 and assigns the product to x.

Hence, the value of x in between lines 11 and 12 is 50

<h3>The value of x in between lines 12 and 13</h3>

On line 12, the function G(n) is called and executed.

This function adds 25 to the global value of x (100) and assigns the sum to x.

Hence, the value of x in between lines 12 and 13 is 125

<h3>The program output</h3>

On line 13, the function H(n) is called and executed.

This function adds -25 to the global value of x (125) and assigns the sum to x.

The output is then printed on line 14

Hence, the output of the program is 150

Read more about Python programs at:

brainly.com/question/16397886

7 0
2 years ago
Other questions:
  • If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,
    8·1 answer
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • Multiple Choice
    6·1 answer
  • Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.
    15·1 answer
  • Who invented the machine known as colossus?
    9·2 answers
  • Vhich economic impact of computers was mentioned in this lesson?
    6·1 answer
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • Gun to yo head any last words??
    10·2 answers
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
  • Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!