1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
13

Most _____ focus on galning entry over the internet to a secure computer system by finding a

Computers and Technology
1 answer:
dangina [55]3 years ago
5 0

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

You might be interested in
How is an API different from a web application?
Yanka [14]

Answer:

Web services (web application) are an API type to be accessed via a network connection. While APIs are application interfaces, this means standardized communication between one application and another application.

Explanation:

  • Web service is used for communication with REST, SOAP, and XML-RPC.

        While API for all communication styles is used.

  • The APIs are all web services. Whereas web services are not APIs.
  • The Web application has no lightweight design, needs a SOAP agreement for sending or receiving system information. While the architecture is lightweight, API is useful for gadgets with limited transmission capacities like smartphones.
  • The web application supports the HTTP protocol only. Whereas the API HTTP/s protocol supports: URL Request / Answer Header etc.
  • The web application is not open source, but any customer who contains XML can devour it. While API  is open-source and has a .net framework.
6 0
3 years ago
A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
Bad White [126]

Answer:

For Plato users the Answer is C

Explanation:

7 0
3 years ago
How to manufacture an ict application?
Vilka [71]
Go to here (Applications in Manufacturing - Free ICT Resources)
3 0
4 years ago
Telecommunications and software development are examples of information technology careers.
9966 [12]

Answer:

True

Explanation:

Information technology may be described as the use of systems to aid application designs capable of sending and receiving information and building a communication pathway for individuals and companies. It also involves retrieving, storing large chunks of information and organizational data usually in databases to fast track the seamless functioning of the organization's system. The information technology ecosystem is very broad from those charged with ensuring effective communication such as telecommunications platforms and those who build and develop technologies for effective communication and data storage. Hence, both Telecommunications and software development are examples of information technology careers.

5 0
3 years ago
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Elenna [48]

Answer:

Static

Explanation:

I just took the test man!

5 0
3 years ago
Other questions:
  • A(n) ____________ specifies a variable's name and data type.
    5·2 answers
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
    7·1 answer
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • Which entity might hire a Computer Systems Analyst to help it catch criminals?
    12·2 answers
  • You are doing a Diffie-Hellman-Merkle key exchange with Danny using generator 2 and prime 29. You pick the secret number 4. What
    14·1 answer
  • Please help I’ll mark brainliest!
    12·2 answers
  • A protocol stack is _____.
    11·2 answers
  • What do you setup when you want to filter traffic from getting through a firewall?
    13·1 answer
  • While some audio recording programs are expensive, there are more user friendly,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!