1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
15

Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further obser

ve that your network gateway shows high levels of network activity, even though you have closed your email client., Web browser, and other programs that access the net. What types of malware could cause these symptoms
Computers and Technology
1 answer:
atroni [7]3 years ago
6 0

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

You might be interested in
windows 10 brought back the desktop, and gives the option to use either the start screen or desktop with a new tiled___
levacccp [35]

Answer:



A new tiled background

5 0
3 years ago
Which feature does the web designer fail to apply in this layout for a web page? A. harmony
iogann1982 [59]
The answer is D.balance
3 0
3 years ago
Read 2 more answers
The speed of sound depends on the material the sound is passing through. Below is the approximate speed of sound (in feet per se
german

Answer:

The Java Program for the given problem is as below. Directly copy the code and run it on your machine.

Explanation:

Refer the Screenshots attached for the output.

import java.io.BufferedReader;

import java.io.InputStreamReader;

public class TheSpeedOfSound {

public static void main(String[] s)

{

String medium;

double distance;

double time;

try{

BufferedReader choice = new BufferedReader(new InputStreamReader(System.in));

System.out.println("Enter one of the following: air, water, or steel: ");

medium = choice.readLine(); // reading input i.e. air, water or steel

//check for air water and steel

if (medium.equalsIgnoreCase("air") || medium.equalsIgnoreCase("water") || medium.equalsIgnoreCase("steel")){

System.out.println("Enter the distance the sound wave will travel: ");

distance = Double.parseDouble(choice.readLine()); // read distance value if it is air water or steel

switch (medium)

{

//if medium is air

case "air":

time = distance/1100;

System.out.print("It will take " + time + " seconds.");

break;

//if medium is water

case "water":

time = distance/4900;

System.out.print("It will take " + time + " seconds.");

break;

//if medium is steel

case "steel":

time = distance/16400;

System.out.print("It will take " + time + " seconds.");

break;

}

}

else{

System.out.print("Sorry, you must enter air, water, or steel.");  

}

}

catch(Exception e){

e.printStackTrace();

}

}

}

8 0
3 years ago
If you owned an online clothing company and you only had the resources to run one social media campaign, which platform would yo
nikdorinn [45]
Hi!

If I had to pick a social media platform for a clothing company's campaign I would choose Instagram due to its large following and tons of traffic, also the large number of female users, which for a clothing company is usually the target audience.

I would have originally said facebook, but due to recent policy changes that would not be my first choice.

-<span>ASIAX </span><span>  </span><span>Frequent Answerer</span>
3 0
3 years ago
How can an attacker execute malware through a script?
Anvisha [2.4K]

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

5 0
2 years ago
Other questions:
  • Why is art important to heritage?
    10·1 answer
  • James wishes to access a certain software service via different computing systems over the Internet. What technology provides so
    13·2 answers
  • A list of the slides in a presentation is found here.
    7·2 answers
  • Define the term e-learning​
    5·2 answers
  • Write a program that produces the following output:
    12·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • Android OS "AFTER" Beta.<br><br> A. Cupcake<br><br> B. Candy<br><br> C. Cookie<br><br> D. Carmel
    12·1 answer
  • The Brinley website will not let me search for questions anymore. It says “Search all you want in-app” and then covers the quest
    14·1 answer
  • What does l m a o actually mean?
    6·1 answer
  • Does anyone have any advice for me im a junior in highschool
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!