1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
7

Joe, a user, reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appea

r on the screen earlier, but he closed it without reading it. Upon investigation, the technician sees high disk activity on Joe's PC. Which of the following types of malware is most likely indicated by these fndings?
a) keylogger
b) trojan
c) rootkit
d) crypto-malware
Computers and Technology
1 answer:
posledela3 years ago
8 0

Answer:

The answer is most likely B) Trojan.

Explanation:

You might be interested in
What type of maintenance can prevent the computer from breaking?
qwelly [4]
<span>The answer is, "Load anti-virus software".
</span>Anti-virus softwares are used to prevent computer from virus, as it name shows that are anti-virus means they prevent from virus. Anti virus softwares are also known as anti-malware software. These software work in such a way that they <span>prevent, detect and then remove viruses or </span><span>malicious software.</span>
3 0
3 years ago
Read 2 more answers
Households play a role in the circular flow of goods by
BaLLatris [955]

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

6 0
3 years ago
In the source-code file containing a class’s member function definitions, each member function definition must be tied to the cl
jenyasd209 [6]

Answer:

Binary Scope Resolution Operator

Explanation:

The :: (scope resolution) operator is used to get hidden names due to variable scopes so that you can still use them. The scope resolution operator can be used as both unary and binary. Fortunately, in this context we're not dealing with hidden contents; thus the Binary applies better than the Unary.

Cheers

5 0
3 years ago
if i were to plug this in my ps4 usb port and connect it to the tv would it work please and if so please explain
Brilliant_brown [7]
Probably, most likely yes. this is just basically adding a bit of extra length. the ps4 port goes in the end and the part for the tv acts as a hdmi cord.
4 0
3 years ago
Read 2 more answers
Which of the following is not considered a flow in supply chains?
kramer
I don’t know if this helps, but here are three types of main flows: flow of material/goods, flow of money/cash, and flow of information.
5 0
2 years ago
Other questions:
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • Which software would you use to create a print design?
    8·2 answers
  • __________ refers to rules, statutes, codes, and regulations established to provide a legal framework within which business may
    13·1 answer
  • What is the multiple source test
    15·1 answer
  • Before inserting a preformatted table of contents, what must you do first?
    8·1 answer
  • How does the system work for this:
    15·2 answers
  • What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?
    7·1 answer
  • Wht is these things Aᔑ bʖ cᓵ d↸ eᒷ f⎓ g⊣ h⍑ i╎
    15·2 answers
  • What skills and practices are important when creating an interactive program?
    12·1 answer
  • What are the real-life applications of coding?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!