1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
7

Joe, a user, reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appea

r on the screen earlier, but he closed it without reading it. Upon investigation, the technician sees high disk activity on Joe's PC. Which of the following types of malware is most likely indicated by these fndings?
a) keylogger
b) trojan
c) rootkit
d) crypto-malware
Computers and Technology
1 answer:
posledela3 years ago
8 0

Answer:

The answer is most likely B) Trojan.

Explanation:

You might be interested in
Select the tasks that would be performed by an information systems graduate.
Tomtit [17]

I think data mining and software design.

6 0
3 years ago
In the sentence below, identify the proofreader's marks used.<br><br>Check my answer please :)
Ulleksa [173]
The answer is (A) Close up or Close space


Basically, the best way to learn proofreading marks is to constantly use them and to try and memorize them. In the example above, the marks are categorized as those for inserting, deleting and changing text. In this case the marks represent delete character and close up. The numbers after correction would be (333-1122)
3 0
3 years ago
Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself
emmainna [20.7K]

cheatercheatercheatercheatercheatercheatercheatercheatercheatercheatercheatercheater

7 0
3 years ago
The method __________ sets the font (helvetica, 20-point bold) in component
Stolb23 [73]
The method d) c.setFont(new Font("Helvetica", Font.BOLD, 20)) sets the font (Helvetica, 20­point bold) in component C. A set of instructions that can be called for execution using the method name is a method in Java that can take in data or parameters and return a value - both parameters and return values are optional.
7 0
3 years ago
unscramble the letters to identify which step of the scientific method each statement repesents why is the sliced cheese in the
Rudiy27
Sorry the only word I could get from that is problem, is that possibly the answer?
5 0
3 years ago
Other questions:
  • Distingush between Microkernels andexokernels
    9·1 answer
  • Look at the code in the example below, and then answer the question. In the example code, what does the title attribute create?
    12·2 answers
  • . What is a "secondary dimension" in Google Analytics?
    9·1 answer
  • Having network users login with a username and password is an example of:
    12·1 answer
  • The UNIX operating system started the concept of socket which also came with a set of programming application programming interf
    12·1 answer
  • To add a row labeled "total" to a query design click the ____ button in the show/hide group on the design tab on the ribbon.
    14·2 answers
  • A store that has both an e-commerce site as well as a physical store (building) is known as:
    8·1 answer
  • Use the drop-down menus
    9·2 answers
  • Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of d
    7·1 answer
  • PLEASE HELP!!! NO LINKS!! I'LL GIVE BRAINLIEST!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!