1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
4 years ago
13

Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of

ficer's (CEO's) birthday deleted all of the company's customer records. What type of malware was used in this attack?
Computers and Technology
1 answer:
inn [45]4 years ago
4 0

Answer:

The answer is viruses

Explanation:

Because it is a harmful software hidden inside another  and usually performs a harmful action, such as destroying data.

You might be interested in
What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
vivado [14]
The acronym RFID (Radio Frequency Identification) describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrigerators, automobile components, light bulbs, and industrial control devices. RFIDs are  battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are  scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.



5 0
3 years ago
Membrane-bound organelles are not found in the cells of A) bacteria. B) fungi. C) plants. Eliminate D) protists.
77julia77 [94]
The answer is A. Bacteria leave a thanks if i am correct please.
7 0
3 years ago
Read 2 more answers
What is cpu write its parts<br>​
aev [14]

Answer:  a CPU is a central processing unit. They’re responsible for creating and executing instructionsl

Explanation:

6 0
3 years ago
What is the main difference between EDBAC and EDNIAC......​
lawyer [7]

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

6 0
4 years ago
Read 2 more answers
Bruce needs to have a drive to rerecord data on the used DVD
Dahasolnce [82]

Answer:

DVD- RW

Explanation:

4 0
4 years ago
Other questions:
  • Which program can damage your computer
    13·2 answers
  • What's the screen that displays results from typing text, performing calculations, or running programs?
    11·1 answer
  • Write a brief one parapragh summary describing the financial reality of the American family.
    10·1 answer
  • Mobile apps known as news _________ collect articles from a variety of sources and present them to you in a magazine-style forma
    7·2 answers
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • Question 2 (5 points)
    12·1 answer
  • What is the name for a hardcoded value entered into a formula ?
    8·2 answers
  • Please help explain this calculator code.
    15·1 answer
  • Write a function solution that, given an array A consisting of N integers, returns the number of fragements of A whose sum equal
    9·1 answer
  • Communication protocols, sets of rules agreed to by all parties, are designed in order to:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!