1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
4 years ago
11

Paxton uses social media to post links that, when clicked, secretly install software on hundreds of others personal computers wi

thout their owners knowledge paxtons software is harmful to the computers on which he installed it. this program is?
Computers and Technology
2 answers:
Hoochie [10]4 years ago
4 0
The program that is used by Paxton is called a malware. It is a short term for a malicious software. This is a program that is really designed or made to have an access or to damage computers when activated. This software includes, worms, viruses, spywares and Trojan horses.
xenn [34]4 years ago
4 0

Answer:

Malware

Explanation:

Malware is a type of software that damages a computer when installed. The term comes from the idea of "malicious software." This type of software is designed to damage the computer, steal data, gain unauthorized access to the computer or be harmful in some other way. Some common types of malware are viruses, trojans and spyware.

You might be interested in
What is the system of computers, routers, wires, cables,etc. that allow computers to communicate called?
Anika [276]
Internet maybe?
Not 100% sure though
5 0
4 years ago
What is the main difference between inserting header/footer in excel and word?​
Zepler [3.9K]

Answer:

Header is at the top of the page and used for epicas and titles, while footers at the bottom are used for footnotes or page number

7 0
3 years ago
A rookie programmer has just typed over 1000 lines code into the command line interpreter for a project that is due the next day
Kipish [7]

Answer:

I believe the answer is ''You have to remove all code from the interpreter before closing it'.

Explanation:

3 0
3 years ago
Background information
Ber [7]
Well I guess no breathing for you lol
6 0
3 years ago
Read 2 more answers
Which situations are the most likely to use telehealth? Select 3 options.
shutvik [7]

Answer:

Your doctor emails a suggested diet plan.

Your brother was tested for strep throat and now you think you have it.

Your doctor invites you to use the patient portal to view test results.

3 0
3 years ago
Other questions:
  • What is a organisation in office technology
    7·1 answer
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • Wouldn’t it be nice if whenever we messed up our life we could simply press ‘Ctrl Alt Delete’ and start all over?
    14·2 answers
  • Identify a data type applied in an input element to create slider controls.
    13·1 answer
  • Website hosting servers have their own unique IP address, what does this address consist of?
    8·1 answer
  • If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement bi
    7·1 answer
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • 10<br> Which of the following is not one of the most popular Spreadsheet software applications?
    6·1 answer
  • Boolean, integer, string, and float are examples of:
    9·2 answers
  • The process of learning by making mistakes and by trial and error is called _____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!