1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
14

What type of malicious software masquerades as legitimate software to entice the user to run it?

Computers and Technology
1 answer:
Vlada [557]3 years ago
4 0

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

You might be interested in
How does a lock-up converter obtain lock-up
Nonamiya [84]

Answer:

It allows the engine to turn at a lower RPM when the vehicle is traveling at higher speeds. However, when the engine turns more slowly it causes the torque converter to slip, creating heat. ... The solution is to lock the converter. Lock-up eliminates the slippage, which reduces heat and improves fuel economy.

Explanation:

comment how it helps

8 0
3 years ago
Read 2 more answers
To format the legend on the chart, use the ____
cupoosta [38]
The correct answer for the question that is being presented above is this one: "c. Legend gallery." <span>To format the legend on the chart, use the legend gallery. It is where you can refer for something based on the graph or table or data.</span>
Here are the following choices:
a. Formulas tab
b. Review tab
c. Legend gallery
d.Legend style
5 0
4 years ago
Which collaboration technology is becoming more and more popular within organizations because it provides a means for forming ad
Leona [35]

Answer:

d) Social networking sites

Explanation:

-Intranet is a network that is created by an organization to share information, tools and different services inside the company.

-Wikis are websites used to share content and knowledge and different users can modify the information.

-VoIP is a technology that allows you to make calls over the internet.

-Social networking sites are online platforms that allow people to connect with organizations and other people, create communities online and share different types of information.

-Unified communications is a system that has different communication methods through a single application.

According to this, the collaboration technology that is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies is social networking sites.

8 0
3 years ago
Structure for forloop?
solong [7]

Answer:

for ( initialization; condition;increment)

{

code goes here;

}

in python:

for i in list/range:

code with proper indentation

By initialization above we mean, like int i=0; etc.

By condition like i<10;

and by increment it means like i++, ++i or i+=1; etc

And in python, i can be an integer value if the range is mentioned, and it can be an item of a list if the list is used. We can also use an array, string and various other data structures in python. like we can have characters in a string and so on.

Explanation:

Please check the answer section.

8 0
3 years ago
When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
Artist 52 [7]

Answer:

a. dashboard

Explanation:

In almost every program or webpage where you log in with a personal account. The first screen that contains all your pertinent information and the controls/tools for your account is known as the dashboard. Here you are able to adjust, modify, fix, and analyze all aspects of your account, including the data it contains. The dashboard is extremely useful and often times a necessity for every application.

7 0
3 years ago
Other questions:
  • Match the following tasks with their appropriate timing.
    8·1 answer
  • Which of the following characters is acceptable to use in a filename
    15·2 answers
  • Problem 6. (Fibonacci Number) Write a program fibonacci.py that accepts n (int) as command-line argument, and writes to standard
    7·1 answer
  • A field is _____. a complete entry in a database one of the categories in a database a group of twenty-seven records a cell in a
    8·1 answer
  • What happens? In word 2016 when the home ribbon tab is clicked on ?
    13·2 answers
  • How many months have 28 days?
    8·1 answer
  • 1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x &gt; y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
    12·1 answer
  • What is the different between the patch Tool and the Headling Brush tool?​
    5·1 answer
  • What the advantages and disadvantages of file sharing to the users​
    9·1 answer
  • Complete the statement using the correct term.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!