1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
3 years ago
11

What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y

our computer or steal information from your computer?
Computers and Technology
1 answer:
alukav5142 [94]3 years ago
8 0

Answer:

Trojan horses

Explanation:

The name is derived from the Trojan horse used by Odysseus to pass some soldiers inside the walls of Troy and win the war. This malware disguises like a normal program, or even like a utility, to trick you into installing it, but when you run the program the destructive or stealing function is activated.

You might be interested in
Lydia used software to calculate the budget for each department. To create this budget, she used a _____.
Ann [662]
Lydia used software to calculate the budget for each department. To create this budget, she used a spreadsheet.
4 0
3 years ago
Read 2 more answers
The ____ is a tool in versions of microsoft office starting with office 2007 that consists of tabs, which contain groups of rela
tankabanditka [31]

The answer is A. The Ribbon is a UI component which was presented by Microsoft in Microsoft Office 2007. It is situated underneath the Quick Access Toolbar and the Title Bar. It includes seven tabs; Home, Insert, Page design, References, Mailing, Review and View. Every tab has particular gatherings of related summons.

6 0
3 years ago
How all wheel drive works
faltersainse [42]
Yani cnm bu senin kararin istegidiin gibi davran Basarilar
8 0
3 years ago
Is it possible to do calculations with text data in Ms Excel
ss7ja [257]
The answer for this question is YES
3 0
3 years ago
Read 2 more answers
Write a brief explanation of the problems that can occur in each of the following scenarios and what you should do to avoid thes
photoshop1234 [79]
1. Horsing around can lead to breaking equipment in the classroom or somebody getting hurt

2. leaving your backpack on the floor can cause someone to fall

3.something unexpected may happen and worsen the problem

4. it can corrupt the computer's files and deleted unsaved work.

if you want the sentences to be longer, add some words to them and make the message the same.
4 0
3 years ago
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • I need a free flashdrive can anyone tell me any website links so i can get one for free????​
    11·1 answer
  • Super easy question but you have to think about it because it’s not that easy I’ll mark brainliest for first answer Explain the
    11·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • What is the process of attaching gage blocks to each other
    7·1 answer
  • Test if the word mold is stored in the variable word.
    5·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
  • When trying to upload assignment on canvas wont let me click choose file.
    6·1 answer
  • imagine that you are explaining the art of visual comparison to a group of photography students. You are mentoring. What do you
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!