1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
10

If your computer has a ________, someone else can gain access to it undetected.

Computers and Technology
1 answer:
irinina [24]3 years ago
3 0
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
You might be interested in
Match the column.<br> Description Shortcut key<br> Move to next cell in row page up
Musya8 [376]

The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

<h3>What are computer shortcut keys?</h3>

A computer shortcut is known to be some group of one or a lot of keys that brings about a command in software or in any kind of operating system.

Hence, The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

Learn more about computer shortcut from

brainly.com/question/12531147

#SPJ1

4 0
2 years ago
As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
strojnjashka [21]

Answer:

TACACS+

Explanation:

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.

3 0
3 years ago
Communication between a computer and a keyboard involves ______________ transmission.
4vir4ik [10]

Answer:

Simplex transmission

Explanation:

Communication between computer and keyboard involves which transmission? Answer: Simplex transmission requires communicating between a computer and a keyboard. The simple transmission & communication channel allows data from only one direction.

8 0
2 years ago
Intranets:
SOVA2 [1]

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.

7 0
3 years ago
What are the best gta online buisinesses?​
ELEN [110]

Answer:

Night club

Explanation:

Because night club isn't a day club

3 0
3 years ago
Read 2 more answers
Other questions:
  • Najbardziej znane przeglądarki internetowe
    5·2 answers
  • What does a counterweight do for a mine winding system
    13·1 answer
  • We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
    8·1 answer
  • To open computer manger you would
    13·1 answer
  • Professionalism is defined as what?<br> ASAP PLEASE!
    11·1 answer
  • When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account i
    12·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • Write a program that takes a first name as the input, and outputs a welcome message to that name.
    9·1 answer
  • The concept of taking traffic that’s all aimed at the same node and delivering it to the proper receiving service is known as
    8·1 answer
  • What is lossless compression
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!