1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
8

What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources

Computers and Technology
1 answer:
Phoenix [80]3 years ago
8 0

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

You might be interested in
How do computers use logic?
madreJ [45]
They don’t use any logic
8 0
4 years ago
Given a matrix input_matrix, return a Numpy array that consists of every entry of A that has: an even row index in the range [0,
ipn [44]

Answer:

range [0, 7) an odd column index in the range [3, 8) This can be accomplished in a single line.

def PROBLEM3 (input_matrix):

# YOUR CODE GOES HERE

return output_matrix

# DO NOThern bus under

6 0
3 years ago
__________ is a special place on the hard drive where items from memory can be temporarily stored for fast retrieval
andrew-mc [135]
The answer is swap file 
6 0
3 years ago
Read 2 more answers
PLEZ ANSWER QUICK
harina [27]
The answer is URL. ........
7 0
3 years ago
Read 2 more answers
When creating an input/output table, where do you enter the formula?
balu736 [363]

When creating an input/output table, where do you enter the formula?  

A. In the input cell

B. In the output cell

C. In the title cell

D. In the table of contents


<u>ans. (B) In the output cell</u>

4 0
3 years ago
Other questions:
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?
    9·1 answer
  • Which option best describes the cheapest way to file your federal income taxes?
    5·1 answer
  • What hernia repair codes can be reported with add-on code 49568?
    6·1 answer
  • In what way is your social media footprint related to your digital ID
    12·1 answer
  • 2. Which the following may be a reason for giving a Page Quality (PQ) rating og Highest? Select all that apply (True or False)
    14·1 answer
  • The method "someOtherMethod" is NOT defined as static. This means...
    5·1 answer
  • The goal of a system is to
    10·1 answer
  • Complete the following sentences.
    11·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!