1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
12

A program that can propagate without human interference is a _______.

Computers and Technology
2 answers:
Ipatiy [6.2K]3 years ago
4 0
Worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage, but <span>worms are standalone software and do not require a host program or human help to propagate.</span>
cestrela7 [59]3 years ago
4 0

Answer: Worm spyware

The worms became one of the most potent threat to network security because it contain malicious intent that could damage and infect other files or data. Moreover, worm spyware can self-replicate and spread over the network with or without human interference.

 

You might be interested in
Choose the answer that best completes the statement.
Anestetic [448]
1. A - everything starts there
2. D - always
3. C - true
4 0
3 years ago
Read 2 more answers
What does “modulate your voice” mean?
Pachacha [2.7K]
A) when u modulate some thing you vary it
5 0
3 years ago
To get a sense of your digital footprint, you should:
Serggg [28]
Google yourself once a year.
4 0
4 years ago
Read 2 more answers
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
4. Write a program which selects two integer numbers randomly, adds the numbers and asks the user to enter the answer and then c
KIM [24]

Answer:

import random

number1 = random.randrange(0, 1000)

number2 = random.randrange(0, 1000)

answer = int(input("Enter a number: "))

if answer == number1 + number2:

   print("Your answer is correct")

else:

   print("Your answer is not correct")

Explanation:

The code is in Python

Create two integer numbers using random

Ask the user for an input

Check if answer is equal to number1 + number2. If they are equal, print "answer is correct". Otherwise, print "answer is not correct".

7 0
3 years ago
Other questions:
  • In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
    8·1 answer
  • Which of the following were input devices for early portable computers?
    6·1 answer
  • To what does the term computer hacking refer?
    10·2 answers
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    5·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • Which language is written using 0s and 1S​
    11·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Example of vector image format​
    12·1 answer
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!