1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
2 years ago
12

The local library dealing with a major computer virus checked its computers and found several unauthorized programs, also known

as ______.
A. Software
B. Hardware
C. Malware
D. Torrents
Computers and Technology
2 answers:
Dvinal [7]2 years ago
7 0

Answer:

malware

Explanation:

elena-14-01-66 [18.8K]2 years ago
4 0

Answer: C. Malware

i just did it

You might be interested in
What are TWO examples of soft skills?
Elanso [62]
Computer programming and throubleshooting
3 0
3 years ago
Respond to the following in three to five sentences. Select one netiquette guideline. Explain how this helps you draft more effe
slamgirl [31]

Answer:

Keeping as few emoji's as possible. This helps because lots of emoji's can make things confusing and/or annoying. This just means being kind to the person you're messaging and not making things confusing.

8 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Windows _ is a built-in tool that uses libraries, or groups of related files, to enable you to search for programs, files, or fo
mario62 [17]
Windows explorer is a <span>built-in tool that uses libraries, or groups of related files, to enable you to search for programs, files, or folders on your computer.</span>
7 0
3 years ago
Which statement most thoroughly describes the profession of an engineer​
Free_Kalibri [48]

Answer:

During the engineering design process, the responsibilities of the engineer may include defining problems, conducting and narrowing research, analyzing criteria, finding and analyzing solutions, and making decisions. Much of an engineer's time is spent on researching, locating, applying, and transferring information.

Explanation:

5 0
3 years ago
Other questions:
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • Information flows:
    11·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • HELLO <br> any edmentum people out there.
    15·2 answers
  • 8.5 Edhesive Code Practice
    14·1 answer
  • Which is an example of a demand account
    10·1 answer
  • Goals of the project objectives
    6·1 answer
  • What are the syntax of c programming language?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!