1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
7

Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow

performance Word documents, PDFs, and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
a. Spyware
b. Crypto-malware
c. Rootkit
d. Backdoor
Computers and Technology
1 answer:
coldgirl [10]3 years ago
8 0

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

You might be interested in
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
3 years ago
Read 2 more answers
Describe a problem you’ve solved or a problem you’d like to solve. It can be an intellectual challenge, a research query, an eth
iogann1982 [59]

Answer:

Explanation:

I run an online e-commerce store and lately its been very difficult keeping track of customer detail, incoming orders, keyword generation etc. One solution that I thought about would be an application that controls all of that for me. In order to accomplish this I would first need to design and create a GUI that contains all of the necessary buttons and displays for the information. Then I would need to code a webscraper using Python to grab all of the data from e-commerce store as soon as it becomes available, organize it, and display it within the GUI.

6 0
3 years ago
A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
Elena L [17]

Answer:

// here is code in java.

import java.util.*;

class Solution

{

// main method of class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // declare variable

         double caffeine;

    // scanner object to read input from user

       Scanner scr=new Scanner(System.in);

       System.out.print("Enter the initial amount of caffeine:");

        // read the initial amount of caffeine

           caffeine=scr.nextDouble();

          // calculate amount of caffeine after 6,12,18 hours

          for(int i=1;i<=3;i++)

          {

               System.out.println("After "+ i*6+" hours:"+(caffeine/2)+" mg");

               // update the caffeine after every 6 hours

               caffeine=caffeine/2;

          }

                 

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create a variable "caffeine" to store the initial amount of caffeine given by user. Run a loop for three time, it will calculate the amount of caffeine left after every 6 hours.First it will give the amount of caffeine left after 6 hours, then caffeine left after 12 hours and in last caffeine after 18 hours.

Output:

Enter the initial amount of caffeine:100

After6 hours:50.0 mg

After12 hours:25.0 mg

After18 hours:12.5 mg

8 0
4 years ago
Which of the following correctly describes rules for setting up a Web file structure?
kramer

Forward slashes (/) are used for web address and backslashes (\) are used for file paths is the following correctly describes rules for setting up a Web file structure.

<u>Explanation:</u>

For a way to a nearby document on a Windows machine, utilize the backslash. For a way to a web asset or record situated on a UNIX based machine (incorporates Macs, Linux), use a slash.

The explanation .NET's URI utilizes forward slashes is on the grounds that it's arranging for use in an internet browser. at the point when a slash is utilized in a formal or casual book, it is intended to show the word or. The models show the importance of the forward-slash.

4 0
3 years ago
What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.
ad-work [718]

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.

4 0
3 years ago
Other questions:
  • Checker for integer string (Please answer in C++):
    8·1 answer
  • g Write a recursive function all capital (L,start ,stop) that takes a string L and two integers. It returns a Boolean (True/Fals
    8·1 answer
  • Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
    6·1 answer
  • Which statement assigns the value 140 to the variable streetNumber in Python?
    13·1 answer
  • Comment if u wanna text me on behance
    6·1 answer
  • 1. State three types of web protocols​
    14·1 answer
  • Mi amiga es una chica y es soltera y quiere novia, a cualquiera le interesa?
    11·1 answer
  • Explain the role of protocol and standard organization in facilities interoperability in nertwork communication ​
    13·1 answer
  • HELP ME PASS!
    10·1 answer
  • You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the b
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!