1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
11

Which infection sends information to your computer through a third party

Computers and Technology
2 answers:
Daniel [21]3 years ago
8 0

Answer: Spyware

Explanation:

Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party

Irina-Kira [14]3 years ago
8 0

Answer:

a viriz

Explanation: im only in 69th grade i wouldent know

You might be interested in
How are special characters added to a Word document? Check all that apply.
MrRissso [65]

It kinda depends on what you mean by special characters

7 0
3 years ago
Read 2 more answers
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
The was the series of events that marked the start of the Information Age
Artyom0805 [142]

The Information Age was the series of events that marked the start of the Information Age

Further Explanation:

I would simply put digital revolution as the gradual shift of technology from analogue to what is now known as digital technology. This sort of a paradigm shift began somewhere between the late 1950s to the late 1970s and has continued to this day. In a span of only 50 years, digital revolution has advanced tremendously and it is yet to start. The Digital Revolution marked the beginning of the Information Age.

The Information Age or the computer age as many would put it is what defines this shift. The invention of transistors, chips and the internet revolutionized the modern world and brought about the birth of information age. It is what connects us to the human civilization. Scientists capitalized on digital micro-miniaturization and as a result formed the Information Age. It is here with us and its sole existence has been embraced by billions of people worldwide.

Learn more about information age

brainly.com/question/10028333

brainly.com/question/10385855

#LearnWithBrainly

7 0
3 years ago
Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?
Tanzania [10]

Answer:

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).

SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).

SAN architecture

A storage area network consists of a fabric layer, host layer and storage layer.

6 0
2 years ago
"Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
Feliz [49]

Answer:

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

Explanation:

Let me try as much as I can to explain the concept or idea of iferror in vlookup.

iferror have a typically function and result like an if else statement, its syntax is IFERROR(value,value _ if _ error), this simply means that if the the error is equal to value, value is returned if not, the next argument is returned.

Having said that, feom the question we are given,

let's substitute the value with vlookup function and add an else argument, it will look exactly this way;

IFERROR(VLOOKUP(),"Invalid Staff ID")// now this will set the message if vlookup cannot find the.

On the other hand using the values given, we will have;

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

4 0
3 years ago
Other questions:
  • What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
    9·1 answer
  • Please answer questions 34, 36 &amp; 37. <br><br>No explanation required. ​
    8·1 answer
  • (TCO G) _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according
    7·1 answer
  • When reading words with a scanner object, a word is defined as ____?
    15·1 answer
  • If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and sto
    11·1 answer
  • What is the default view when you first open a PowerPoint presentation
    10·1 answer
  • Help on What i should say to my IT school lady? Read all three pages
    10·1 answer
  • What's the best thing that's happened to you during quarantine?
    10·2 answers
  • Who is responsible for the actions of autonomous systems? (please help me :C)
    14·2 answers
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!