1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
11

Which of the following describes a Trojan horse?

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
7 0

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

You might be interested in
Hi please help ASAP it's about html!​
uranmaximum [27]
<h2><u>Given</u> :-</h2>

Create a HTML code for writing a web page for your school time-table.

<h2><u>Answer</u> :-</h2>

<html>

<head>

<title> Time Table </title>

</head>

<hrcolor = "red">

<hrcolor = "blue">

<body>

<table><tr = "7"><md = "7"><Period 1_></table>

</body>

</html>

\\

Answered by - ItzMaster

7 0
3 years ago
Which of the following formats allow visual, video, and sound capability and can be uploaded to certain social networking sites?
insens350 [35]
It is Microsoft work
This is because
6 0
3 years ago
kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. while download
uranmaximum [27]

By ignoring the opt-out check box that allows the extension to download a search toolbar, the error which has occurred here is that: d. Kate has installed a potentially unwanted program (PUP).

<h3>What is a software?</h3>

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

<h3>What is a potentially unwanted program (PUP)?</h3>

A potentially unwanted program (PUP) can be defined as a piece of software that's bundled into download packages and may be unwanted by the end user because it offers no benefits or may pose high risk.

In this scenario, we can reasonably infer and logically deduce that the error which has occurred here is that Kate has installed a potentially unwanted program (PUP) because she ignored the opt-out check box which then allowed the extension to download a search toolbar.

Read more on potentially unwanted program here: brainly.com/question/25091456

#SPJ1

Complete Question:

Kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. While downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar.

What has occurred here?

a. Kate has installed an injection.

b. Kate has installed a backdoor.

c. Kate has installed a Trojan.

d. Kate has installed a potentially unwanted program (PUP).

4 0
1 year ago
You work for manufacturing company who operate a hybrid infrastructure with systems located both in a local Datacentre and in AW
kotegsom [21]

Answer: Copy the files from the NAS to an S3 bucket with the One Zone-IA class

Explanation:

Th one Zone -IA class with S3 bucket has reduced cost but offers the same durability for which the files needs to be copied from NAS to access them faster.

8 0
3 years ago
Which of these substances is a very important natural resource that is useful in the making of computer chips?
Arisa [49]

Silicon is the conductive material used in making Computer Chips. Krypton only exists in the DC Universe, Granite is a rock and Boron is used for rocket thruster ignitors and other pyrotechnic things.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline.
    15·1 answer
  • The best way to share criticism is to ______. a. write it in the break room b. talk it about with all your coworkers c. talk abo
    7·2 answers
  • What is "the last mile of broadband access"? Why is this a problem and what kind of impact does it have on the business world an
    9·1 answer
  • In which area of the screen can features and functions of Word be accessed?
    9·2 answers
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and
    6·1 answer
  • Please help me with these questions. Thanks o((&gt;ω&lt; ))o
    12·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!