1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
10

I will give brainliest to the first person who can answer correctly.

Computers and Technology
1 answer:
Mariulka [41]3 years ago
4 0
I think that the answer wiloukd be B. For #31 and for #32 A.
You might be interested in
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Write a program that will draw a red circle on top of a blue square in the center of the canvas. The blue square should have sid
MakcuM [25]

Answer:

Explanation:

The following code is written in Python. It uses the imports the turtle class in order to be able to draw a blue square with 100pixels per side and then a red circle with a diameter of 100 pixels that fits perfectly inside the square.

import turtle

t = turtle.Turtle()

#Make Square

t.fillcolor('blue')

t.begin_fill()

t.back(50)

for i in range(4):

 t.forward(100)

 t.left(90)

t.end_fill()

#Make Circle

t.forward(50)

t.fillcolor('red')

t.begin_fill()

t.circle(50)

t.end_fill()

3 0
3 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Ugo [173]

Answer:

Business format franchise or Business Brokers

Explanation:

8 0
3 years ago
Please answer this please
dexar [7]

Answer:

It's not a question.

Explanation:

3 0
4 years ago
Other questions:
  • Machine language is made up of which following codes
    11·1 answer
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • Does the game best fiend need wifi to play on the app?
    8·2 answers
  • The number of bytes in an array is always a multiple of the number of ____ in an array.
    6·1 answer
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • Identify a true statement about a flat file system. a. Data in a flat file system can be updated efficiently. b. Data in a flat
    9·1 answer
  • What outline feature can the Navigation pane browse the document by?
    14·2 answers
  • Write the definition of a function named max that receives an int parameter and returns the largest value that it has been calle
    12·1 answer
  • What is wireless?
    14·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!