Answer: trojan horse virus
Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's
personal information like password information, or they may simply use it to destroy programs or data on the hard disk.
Explanation:
in fourth generation microprocessor was developed.
may it helped u
Answer:
The answer is function
Explanation:
As a function, it accepts two parameters: the value and the key being stringified. It can be used to change the value of the entries or eliminate them. As an array, it specifies by name which entries and names of the properties in the object to include in the resulting JSON string.
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
Make sure you but no copyright, author, and date of publication, that may help.