1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
11

An individual posing as an online gamer accesses information stored in an unsuspecting user’s computer by placing a program in h

is hard disk that appears to be legitimate. The system functions normally with the program performing underlying functions. The malware used by the individual is referred to as a(n) __________.
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
7 0

The malware is called a trojan.

You might be interested in
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
What is authenticity​
jeka94

Answer:

the quality of being authentic

Explanation:

7 0
3 years ago
How to share excel file for multiple users office 365?.
Sholpan [36]

Answer:

You would need that person email to share it with them.

5 0
2 years ago
Read 2 more answers
What sort of negative outcomes are possible for this type of risk?
Harlamova29_29 [7]
More details please?
6 0
3 years ago
Read 2 more answers
An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.
Slav-nsk [51]

Answer:

The answer is "Phreaker".

Explanation:

A "Phreak" is one who secretly hacks into another telephone network, it is usually to make individual long-distance calling or to access the telephone lines.  

  • Sometimes, it involves anyone, who breaches or wants to break any information security.
  • It is used to receive unlimited calls and texts or high-cost contact details, that's why the Phreaker is the correct answer.
3 0
4 years ago
Other questions:
  • What naming scheme identifies the rows in a worksheet?
    5·2 answers
  • True or false: although the first personal computers were available as early as the 1970's, the creation of the world wide web (
    11·1 answer
  • Stacey wants to change her document to landscape view instead of portrait. Jesse wants to change the scale of his document. Whic
    5·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • Somebody supplied me with a file that was edited on a Windows machine. The file contains carriage returns in addition to the new
    9·1 answer
  • What is an internet marketing manager?
    14·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
  • Advantages of python programming language
    10·1 answer
  • The ________ marker is the character that marks the end of a file and is automatically written when the file is closed.
    6·1 answer
  • Name any two software programs that employees can use to communicate effectively ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!