1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
2 years ago
11

What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y

our computer or steal information from your computer?
Computers and Technology
1 answer:
alukav5142 [94]2 years ago
8 0

Answer:

Trojan horses

Explanation:

The name is derived from the Trojan horse used by Odysseus to pass some soldiers inside the walls of Troy and win the war. This malware disguises like a normal program, or even like a utility, to trick you into installing it, but when you run the program the destructive or stealing function is activated.

You might be interested in
The engine type that is fired by gas or oil
salantis [7]
Internal combustion is the answer
8 0
3 years ago
Read 2 more answers
Which of formula contains an absolute cell reference?
svet-max [94.6K]
Which formula contains an absolute cell reference? =SUM($B$7:$B$9)
3 0
2 years ago
Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the pac
Luba_88 [7]

Answer:

You have to do that on your computer not someone elses....

Explanation: you have to do it

6 0
3 years ago
Write a C++ program that will ask the user for the name of a data file.
rosijanka [135]

Answer:

Explanation:

Enter information,

Enter name: Bill

Enter roll number: 4

Enter marks: 55.6

Displaying Information,

Name: Bill

Roll: 4

Marks: 55.6

THIS IS AN EXAMPLE I HOPE THIS HELPS YOU!!

4 0
2 years ago
The first step of converting data into a table is:
adell [148]
B. Select the range of data. You have to highlight it first so it knows what you are going to convert into a table.
8 0
2 years ago
Other questions:
  • Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache. (a) For
    14·1 answer
  • Some technologies like vertical farming have a number of negative effects. Which is a negative outcome of this technology? A. In
    10·1 answer
  • Select the properties of the sn1 reaction mechanism.
    9·1 answer
  • Which window allows you to view and change your computer's system information and settings?
    9·2 answers
  • If a client is found _________ the NAP will attempt to make it _______. Group of answer choices A. non-compliant, compliant B. s
    13·2 answers
  • An index purports to speed data retrieval. you, therefore, index every attribute in each table. select the likely consequence.
    15·1 answer
  • What was your first experience with listening to kpop?
    8·2 answers
  • PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you
    15·1 answer
  • There is a file of a few Sean Connery movies on the internet. Each entry has the following form:
    9·1 answer
  • What starts with p and ends with orn
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!