1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
3 years ago
11

What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y

our computer or steal information from your computer?
Computers and Technology
1 answer:
alukav5142 [94]3 years ago
8 0

Answer:

Trojan horses

Explanation:

The name is derived from the Trojan horse used by Odysseus to pass some soldiers inside the walls of Troy and win the war. This malware disguises like a normal program, or even like a utility, to trick you into installing it, but when you run the program the destructive or stealing function is activated.

You might be interested in
A monopoly is a market that has few competing businesses. many sellers of the same item. many sellers of a variety of products.
MissTica

Answer:

It is when a single company has control of a certain commodity or service.

5 0
3 years ago
Read 2 more answers
Which version of Windows was considered an operating environment rather than an operating system? Windows 1.0 Windows 3.0 Window
Goryan [66]
<span>1.0 Windows was considered an operating environment not an operating system</span><span />
6 0
3 years ago
Which os the following is NOT true about the proof of work concept?
Levart [38]

Answer:

The correct answer is -It is very easy to show in the physical world with real objects.

Explanation:

8 0
3 years ago
If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
Kaylis [27]

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

5 0
2 years ago
Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
motikmotik

Answer:

1. G=D+(A+C^2)*E/(D+B)^3

cobegin:

p1: (D+B)

p2: p1^3

p3: C^2

p4: A+ p3

p5: E/p2

p6: p4 * p5

p7: D + p6

   :G

coend

2. Now The value A=2, B=4, C=5, D=6, and E=8

p1: 6+4 =10

p2: p1 ^3= 10^3= 1000

p3: c^2= 5^2 =25

p4: A + p3= 2 +25 =27

p5: 8/1000

p6: 27 *8/1000

p7: D+ P6= 6+ 216/1000

      = 6216/1000

      =6.216

Explanation:

The above, first bracket with power is processed, and then power inside and outside bracket. And rest is according to BODMAS, and one process is solved at a time.

4 0
3 years ago
Other questions:
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sendi
    14·1 answer
  • Which of the given original work is protected by the copyright law
    9·1 answer
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • Which segment of society introduced the grunge look?
    5·2 answers
  • What's the difference between intranet and extranet ​
    9·1 answer
  • What is the purpose of a primary key?
    5·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Can someone explain what Bytes are? I would really like to know.
    5·2 answers
  • What are the benefits of building redundancy into a network?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!