1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
13

Most _____ focus on galning entry over the internet to a secure computer system by finding a

Computers and Technology
1 answer:
dangina [55]3 years ago
5 0

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

You might be interested in
Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA'as two inputs and returns two independent sets
Zigmanuir [339]

Answer:

Check the explanation

Explanation:

CREATE PROCEDURE sp_Q1

<u><em>"at"</em></u>country1 NVARCHAR(15),

<u><em>"at"</em></u>country2 NVARCHAR(15)

AS

BEGIN

  BEGIN

      SELECT SupplierID, CompanyName, Phone, Country FROM suppliers

      where Country in (<u><em>"at"</em></u>country1,<u><em>"at"</em></u>country2)

     

  SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Products

      where SupplierID in(

      SELECT SupplierID FROM suppliers

      where Country in (<u><em>"at"</em></u>country1,<u><em>"at"</em></u>country2)) ORDER BY SupplierID

  END

END

GO

-- Testing script.

DECLARE <u><em>"at"</em></u>RC int

DECLARE <u><em>"at"</em></u>country1 nvarchar(15)

DECLARE <u><em>"at"</em></u>country2 nvarchar(15)

-- Set parameter values here.

set <u><em>"at"</em></u>country1='UK'

set <u><em>"at"</em></u>country2='Canada'

EXECUTE <u><em>"at"</em></u>RC = [dbo].[sp_Q1]

<u><em>"at"</em></u>country1

,<u><em>"at"</em></u>country2

GO

Kindly check the attached images below to see how it looks like on a code editor.

7 0
3 years ago
What are some ways you can work with templates? Check all that apply.
yaroslaw [1]
What are some ways you can work with templates? Check all that apply.

Answer: (A,D,E) see picture below for help also.

7 0
3 years ago
Read 2 more answers
Some example questions include: ""How does multithreading affect the throughput of a GetFile Server hosting many very large file
zhenek [66]

<em>How does multithreading affect the throughput of a GetFile Server hosting many very large files?</em>

Answer:

It create multiple threads of large file which eventually causes in slowing down the speed of server which results in slower response time.

<em>How does multithreading affect the average response time for a GetFile server hosting a few small files?</em>

Answer:

Multiple threads in smaller files result in rapid response time and enormous process speed in small files.

6 0
3 years ago
What refers to the use of technology to create product styles and designs?
torisob [31]
The answer is graphic design
8 0
3 years ago
How to post a answer
SSSSS [86.1K]
………………….yes yes yes
6 0
3 years ago
Other questions:
  • Combination lock uses three numbers beween 1 and 36 with repetition , how mant combinations are possiable
    6·1 answer
  • Which registry hive is loaded first during windows startup?
    5·1 answer
  • What is the difference between an electronic notebook and electronic flash cards?
    8·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • Is media good for the brain?
    7·2 answers
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • *
    6·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • Who plays oblox .............................
    8·2 answers
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!