Answer:
The answer is "Option D".
Explanation:
Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:
- In option A, It is not correct, this option infects the system.
- In option B, It is used for infects another computer that's why it is incorrect.
- In option C, It is incorrect because it is used in cybersecurity.
Answer:
63 columns
Explanation:
In Microsoft Word you can insert a table with up to 63 columns, that is the limit to the number of columns allowed in a Word document.
<em>brainliest</em><em>? </em><em>plz! </em>
Answer:
In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u> by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u> filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u> exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.
Solution :
- Loopback plug --- confirm interface functionality
It is a connector that is used to diagnose the transmission problems.
- Protocol Analyzer --- Analyze network traffic
It is used to capture and analyze the signals as well as data traffic.
- Throughput tester - Measure link speed
- Time Domain Reflectometer (TDR) - Determining the location of cable fault
It is used in determining the characteristics of the electrical lines by observing the reflected waveforms
- Locating a specific cable - Toner probe
Answer:
The answer to this question is given below in this explanation section.
Explanation:
"structural level design"
Structural engineer is a sub discipline of civil engineer are strained to design the bones and muscles that create the form and shape of man made structures.Structural engineer needs to understand and calculate the stability,strength and rigidity and earthquake of built structure of building and non building structures.The structural of other design are integrated with those of other designers such are architecture and building services engineer and often supervise the construction of projects by contractors on site.They can also be involved in the design of machinery,medical equipment,and vehicle where structural integrity affects functioning and safety.
Structural engineering theory is based upon applied physical law and empirical knowledge of the structural performance of differents materials and geometrics.Structural engineer engineer are responsible for making creative and efficient use of funds,structural elements and materials to achieve these goals.