1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ratelena [41]
3 years ago
9

What is the name of the virus that appears to be a legitimate program but when opened

Computers and Technology
1 answer:
vivado [14]3 years ago
6 0

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

You might be interested in
3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest
miss Akunina [59]

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents -qtr * 25

nkl = int(cents/5)

pny = cents -nkl * 5

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

Explanation:

This gets input for cents

cents = int(input("Cents: "))

This calculates the quarters in cents

qtr = int(cents/25)

This gets the remaining cents

cents = cents -qtr * 25

This calculates the nickel in remaining cents

nkl = int(cents/5)

This calculates the pennies in remaining cents

pny = cents -nkl * 5

This prints the required output

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

6 0
3 years ago
Mile markers appear as _____ green signs.
german

Answer:

A.Big,Rectangular

Explanation:

mile markers are sign on high ways they are green signs they are big and rectangular shape

6 0
3 years ago
Read 2 more answers
What is the term for a media piece that is ineligible for protection by copyright laws,
Nataliya [291]

Answer: D. Public domain

Explanation:

Hi, the term Public domain is applied to works of authorship that are ineligible for protection by copyright laws, because the copyright has expired or it was never copyrighted in the first place.

Public domain may vary in different countries and jurisdictions, for example; a media piece may be protected by copyright in one specific country, and be public domain in other countries.

Feel free to ask for more if needed or if you did not understand something.

6 0
3 years ago
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired
aleksklad [387]

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

3 0
3 years ago
Start every formula with a(n) _____.
Oxana [17]

Start every formula with a(n) equals sign. Check more about formula below.

<h3>What is Excel Formulas about?</h3>

All formulas in Excel is known to often start with an equals sign (=).

This is base on the fact that the cell has , or is the same with the formula and the numbers or values that it is said to be calculating.

Conclusively, therefore, all one has to start every formula with a(n) equals sign.

Learn more about formula from

brainly.com/question/1216161

#SPJ1

6 0
2 years ago
Other questions:
  • A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purc
    11·1 answer
  • Universal Containers needs to add an additional recipient to a workflow email alert that isfired from the case object. What type
    6·1 answer
  • Name at least two types of career options that are available for someone with strong typing skills?
    10·2 answers
  • Some architectures support the ‘memory indirect’ addressing mode. Below is an example. In this case, the register R2contains a p
    8·1 answer
  • Which of the following is a correct group scope type in AD, windows server 2016?
    6·1 answer
  • After conducting interviews with several bad candidates, Althea, a manager at Langrover Inc. interviewed a candidate who was bet
    15·1 answer
  • Wedding photographers must be skilled at producing photographs that capture the
    8·1 answer
  • Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
    13·1 answer
  • In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the execut
    5·1 answer
  • Can anyone help me out with my photography questions?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!