1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
4 years ago
10

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t

argeted IP address.
Computers and Technology
1 answer:
lesantik [10]4 years ago
8 0

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

You might be interested in
Create a class named Circle with fields named radius, diameter, and area. Include a constructor that sets the radius to 1 and ca
REY [17]

Answer:

The code for this class is shown in the explanation section

Explanation:

public class Circle {

   private double radius;

   private double diameter;

   private double area;

   public Circle(double radius, double diameter, double area) {

       this.radius = 1;

       this.diameter = diameter;

       this.area = area;

   }

   public void setRadius(double radius) {

       this.radius = radius;

       diameter = radius*2;

       area= Math.PI*(radius*radius);

   }

   public double getRadius() {

       return radius;

   }

}

6 0
3 years ago
What is one way in which tablets differ from laptops and notebooks
olga55 [171]
One way is the tablet is more portable in the hand and has a virtual keyboard.

6 0
4 years ago
Read 2 more answers
Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T
iren [92.7K]

Answer:

Explanation:

( n cards are there initially )

we pick out the first card in random it takes n-1 comparisons to figure out

its Equivalence card - n-1 steps

Two cards have been eliminated ( this leaves us with 2 and n-2 cards)

we pick out the 2nd card in random it takes n-3 comparisons to figure out

its Equivalence card - n-3 steps

we continue to do this.. till all cards are exhausted ( leaves us with 2

and n-4 cards again)

the last comparison will

have

- n-(n-3)

the sum of all these steps - (n-1) + (n-3) + (n-5) + .........+

(n-(n-3))

if you draw this in the form of a tree.

n - n

2

n-2 - n

2

n-4 - n-2

2

n-6 - n-4

2

n-8 - n- 6

the height of the tree will be log n , sum @ each level is at most n

8 0
3 years ago
Complex communication skills will probably never be outsourced to a computer because they require the human touch.
frutty [35]
True because eventually a human needs to repair the computers
4 0
4 years ago
Is it ok to use a does red wine clean the inside of a computer true or false
Dmitry [639]
I don't understand what you are saying but I'm willing to help
4 0
3 years ago
Read 2 more answers
Other questions:
  • On most computers, the default font size in word is ____. 8 11 14 16
    8·2 answers
  • Why is the wizard able to install the printer when an actual print device is not connected to the computer??
    11·1 answer
  • Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
    7·1 answer
  • Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way fo
    14·1 answer
  • Portfolio Activity: Writing a Résumé
    5·1 answer
  • What best describes the computer's BIOS (basic input-output system)?
    5·1 answer
  • Original documents or objects used during Internet research are known as
    8·2 answers
  • Information in _____ code can be transmitted without errors over the communication network.
    13·2 answers
  • The math club starts with 5 members. Five months later, their membership has grown to 50 members.
    5·2 answers
  • The (blank) option will help determine the overall look of her presentation.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!