1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
3 years ago
13

A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such

as trojans, viruses, or worms.
Computers and Technology
1 answer:
finlep [7]3 years ago
6 0

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

You might be interested in
Write a program code which asks for 80 numbers between 100 and 1000 to be entered.
Firlakuza [10]

Answer:

If you are using Python,

```count = 0

for i in range(0, 79):

a = int(input("Input a number: "))

if 100 <= a <= 1000:

 if a > 500:

  count += 1

else:

 print("Please input a number between 100 and 1000!")

 i -= 1

print(count)```

Explanation:

count refers to the number of 500s and above,

the for loop is required for the program to loop 80 times,

a is the input collected,

the nested if is to check whether the number is above 500 and the if is used to check if the number is between 100 and 1000 if not, it will output that you need to input a number between 100 and 1000,

the i-=1 is required to make sure that part wasn't counted.

and the last print is to output the number of numbers above 500

8 0
3 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
3 years ago
The following method public String removeFromString(String old, String frag) removes all occurences of the string frag from the
Mashutka [201]

private static String removeFromString(String old, String frag)

{

int i = old.indexOf(frag);

while (i> -1) {

String rest = old.substring(i + frag.length());

System.out.println("rest = " + rest);

old = old.substring(0, i);

System.out.println("rest = " + old);

old = old + rest;

System.out.println("rest = " + old);

i = old.indexOf(frag);

System.out.println("i = "+ i);

}

return old;

}

Here the index of first occurrence is obtained outside the “while loop” and if this loop runs until index value is >-1. It extracts the rest of the characters other than “frag” from the index and all the characters for which the given set of characters are removed.

4 0
3 years ago
If directory server a trusts directory server b, directory server b trusts directory server c, and directory server a trusts dir
topjm [15]
This is a transitive trust which is a two-way correlation routinely made among parent and child domains in a microsoft active directory forest and when a new domain is produced, it bonds resources with its parent domain by evasion in which allowing an valid user to access resources in together the child and parent.
4 0
3 years ago
The entirety of a packet at one Layer becoming the payload section at another is know as?
MA_775_DIABLO [31]
The answer to the question is: encapsulation
8 0
3 years ago
Read 2 more answers
Other questions:
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Source view shows your website_____ A) exactly as it would appear when published B) approximately as it would appear when publis
    8·2 answers
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • Which location-sharing service offers items for users as a gaming component and also allows them to collectively link their chec
    9·2 answers
  • How to use repl.it css
    7·1 answer
  • A _____ network is where all computers are equal and each one is both data requester and data provider.
    13·1 answer
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0
    9·1 answer
  • The most widely used computer device​
    6·2 answers
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!