1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
9

A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con

nected to the network. (Hint: one word)
Computers and Technology
1 answer:
Darya [45]3 years ago
5 0

Answer:

Worm

Explanation:

This is what a worm does! It exploits small security holes in networks and computers.

You might be interested in
Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
Darya [45]

Answer:

B) security as a service I'm just doing the work

4 0
3 years ago
Answer pls pls pls pls pls ​
nataly862011 [7]

Answer:

identify materials to create a prototype

6 0
2 years ago
operating systems for mobile devices can support full-scale software programs like Microsoft Word or Excel
goldfiish [28.3K]
Mobile devices are unable to run full scale software programs like MS Word or Excel. They can run apps however with smaller capabilities as they require less hardware and specifications than the full version
The answer is false
7 0
3 years ago
What controls a computer's basic operations?
S_A_V [24]
 Basic Computer Operations. Input: Information and programs are entered into the computer through Input devices such as the keyboard, disks, or through other computers via network connections or modems connected to the Internet. The input device also retrieves information off disks.
3 0
4 years ago
When should you try to photograph reflections on bodies of water?
Wewaii [24]

Answer:  C. although a rainy day (A) would make it more aesthetic

6 0
4 years ago
Other questions:
  • Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
    14·1 answer
  • An application is to be written that would allow students to find out their GPA(double) and their total number of credits (an in
    15·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • What was the first Apple computer, and who was it designed by?
    7·2 answers
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variabl
    6·1 answer
  • Write a lottery program that will ask the user if they would like to pick 5 numbers (1-30) or if they would like to choose EZ Pi
    5·1 answer
  • The act of illegally copying software, music,or movies that are copied protect?
    7·2 answers
  • Choose the term that matches each description.
    15·1 answer
  • How are actual rocket launches similar to how balloon rockets and canister rockets launch?
    6·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!