1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
12

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic

ate themselves.A. virusesB. wormsC. McCumber cubesD. Trojan programs
Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
5 0

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
You might be interested in
Beth wants to add information to her powerpoint presentation that is hiden from her audience and only she will see. Which featur
umka21 [38]

Answer:

She should use her "notes pane" in the PowerPoint

Explanation:

PowerPoint is a very good graphics software program available in different versions as a result of upgrades, with in-built functions which aid presentations of information in different formats such as text, videos, graphs in slides. It also allows printing into a hard copy.

Notes pane is a section in the PowerPoint software program located below the slide pane, in other words, it is a box found at the bottom of the slide. You write information in that box when you don't want the audience to see the information when they are viewing the slides during a presentation, giving Beth, for instance, the ability to still add some things that could assist her presentation.

7 0
3 years ago
You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintai
lukranit [14]

Answer:

123

Explanation:

123

7 0
3 years ago
~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
Andreas93 [3]

Answer:

i dont know anything about them only that the bear is the ducks son and the duck is the fox mom.

Explanation:

6 0
3 years ago
Read 2 more answers
In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
vovikov84 [41]

true, it is responsible for the management, scheduling, and coordination of task

7 0
4 years ago
1. Flash Drive Price - An electronics company makes 64 gigabyte USB flash drives that cost them $8.00 apiece to produce. Write a
BaLLatris [955]

The programs are illustrations of sequential programs,

<h3>What are sequential programs</h3>

Sequential programs are programs that do not require loops (iterations) and conditional statements.

<h3>The flash drive program</h3>

The flash drive program written in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This calculates the selling price

   double sellingPrice = 8.00 * 1.35;

   //This prints the selling price

   cout<<"Selling price: $"<<sellingPrice;

   return 0;

}

<h3>The basketball program</h3>

The basketball program written in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This initializes the height in inches

   int heightInches = 75;

   //This prints the height in feet/inches

   cout<<"Height: "<<(heightInches/12)<<" feet, "<<(heightInches%12)<<" inches";

   return 0;

}

Read more about sequential programs at:

brainly.com/question/17970226

3 0
3 years ago
Other questions:
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • Develop Java methods to perform the following operations on an unordered list (using linked lists). What is the complexity of ea
    15·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • which of the following uses technical and artistic skills to create visual products that communicate information to an audience?
    14·1 answer
  • Public-key encryption schemes are secure only if the authenticity of the ___________ is assured.
    12·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • ......... defines the path of the movement for an object.
    12·1 answer
  • 1. What are the main uses for Protein in the body?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!