1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
15

Why is malware dangerous

Computers and Technology
2 answers:
marusya05 [52]3 years ago
8 0

Answer:

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

Explanation:

Sonbull [250]3 years ago
6 0

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

You might be interested in
JAVA
Vlada [557]

Answer:

Answer is in the attached screenshot!

Explanation:

Iterate through the given input strings, create a student class with the given name, assign the output array to the value of the class created from the given input string. Finally, return the array.

8 0
3 years ago
Are u a chicken nugget!!??
creativ13 [48]
Yes. Yes I would classify myself as the nugget of the chicken thank you for asking me. 
3 0
3 years ago
Read 2 more answers
What type of protocol provides a way to transfer files from one computer to another over tcp/ip such as lan?
leva [86]
FTP provides this functionality.
5 0
3 years ago
There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n
nataly862011 [7]

The answer & explanation for this question is given in the attachment below.

8 0
3 years ago
Users of an extranet can access a company or organization’s entire intranet
Tasya [4]

Answer:

yes

Explanation:

yes

4 0
3 years ago
Read 2 more answers
Other questions:
  • You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
    9·1 answer
  • A _____ is a member function that is automatically called when a class object is created.
    13·1 answer
  • A computer processor can become extremely hot and must be cooled. A heat sink is placed on top of the processor to extract its h
    13·1 answer
  • HELP ASAP!!!
    11·2 answers
  • Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerica
    15·1 answer
  • A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparatio
    13·1 answer
  • Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
    5·2 answers
  • How can you make a search phrase more effective?
    11·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
  • What symbol do we use to assign a value to a variable or constant in algorithms?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!