Answer: trojan horse virus
Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's
personal information like password information, or they may simply use it to destroy programs or data on the hard disk.
C.cancel the file htd dismal
Bridge communication is the best solution to continue two different building for the same company.
<u>Explanation:</u>
Bridge communication to be placed in both building.master device should be placed in one building where should be connected to a high-end server and the slave device should be placed in another device.
Both the master device and salve should have a subsequent TCPIP address. For example, if the master TCPIP address is 192.168.1.51 and the salve Tcpip address should be 192.168.1.52.
Very easy configure and communication is established. Both devices should be connected with nonstop current interruption. Once communication established speed depends on device capacity.
A method is written with the header 'num' yourMethod(string name, num code). The method's type is <u>'num'.</u>
In the context of programming. a header refers to supplemental data placed at the beginning of a block of data being transmitted or stored. In the context of the Java method, the header is where you tell the Java program what value type if any, the method will return (a string value, an int value, a double value, etc). As well as the return type, you require a name for your method, which is also placed in the header. You can pass values over to your methods in between a pair of round brackets.
You can learn more about method in Java at
brainly.com/question/28489761
#SPJ4