1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
10

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t

argeted IP address.
Computers and Technology
1 answer:
lesantik [10]3 years ago
8 0

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

You might be interested in
Instructions:Select the correct answer.
balandron [24]
The answer is installing antivirus software
3 0
3 years ago
Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line 3 inFile >> x >> y;
MrMuchimi

Answer:

inFile.open("progdata.dat");

Explanation:

This command opens the file which is passed to it as an argument. We are quite used to the C++'s cin and cout functions contained in iostream library for reading and writing data, however, when working will real-life stuff, we find ourselves working with huge data saved as separate files and require our programs to read them, manipulate them and possibly write back to the files... The first operation usually carried out before a file can be read or written to is open

6 0
3 years ago
What is your understanding about the subject “digital image processing”?
N76 [4]

Answer:

Here's your answer mate.....☺️☺️

Explanation:

In computer science, digital image processing is the use of a digital computer to process digital images through an algorithm. ... It allows a much wider range of algorithms to be applied to the input data and can avoid problems such as the build-up of noise and distortion during processing.

<em><u>Hope it helps </u></em>☺️

5 0
3 years ago
Read the following scenario. How might Sarah correct successfully complete her task? To permanently remove a file from her compu
Mekhanik [1.2K]

I'd go with two answers.

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

Or

B: Empty the Recycle Bin.

This question is somewhat not clear. Why I went with the answers above is because I really do not know what kind of a file Sarah wants to permanently remove. You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

7 0
3 years ago
Why is the central limit theorem so important to the study of sampling distributions?
givi [52]

Answer:

in the paragraph

Explanation:

The central limit theorem is known to be important to the study of sampling distributions because it enables us to disregard the shape of the population when the value of n is relatively large. Was this answer helpful?

7 0
2 years ago
Other questions:
  • If there are 8 opcodes and 10 registers, a. What is the minimum number of bits required to represent the OPCODE? b. What is the
    10·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • The Linux operating system was created by which software engineer?
    15·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
    15·1 answer
  • What is social media ​
    13·2 answers
  • 4. UPS stands for Uninterrupted Power Supply . (Yes /no
    11·1 answer
  • State two function of protein in the body
    8·1 answer
  • Write a program that gets three input characters which are user's initials and displays them in a welcoming message. Then gets i
    12·1 answer
  • Select the statements that are true regarding IP addresses. Check All That Apply assigned to your home network by your ISPassign
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!