1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
5

Software intended to damage computer systems.

Computers and Technology
2 answers:
Yanka [14]3 years ago
8 0

Answer Malware

Explanation:

Malware is a shortened term for "malicious software." Malware is software designed to infiltrate or damage a computer without the owner's consent or knowledge.

DIA [1.3K]3 years ago
7 0

Explanation:

id 6488886211

pass 9999

You might be interested in
Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group me
Zigmanuir [339]

Answer:

Apple iWork.

Explanation:

Apple iWork would not work for whole group.

6 0
4 years ago
Which of the following scenarios demonstrates leadership?
bulgar [2K]
I can’t see the scenarios bro
8 0
3 years ago
Read 2 more answers
What does Digital Citizenship mean to you?
Nikolay [14]
A digital citizen refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others, participate in society and create and consume digital content. Digital citizenship is about confident and positive engagement with digital technologies. Digital citizenship refers to responsible technology usage, and teaching digital citizenship is essential to helping students achieve and understand digital literacy, as well as ensuring cyberbullying prevention, online safety, digital responsibility, and digital health and wellness.
5 0
3 years ago
During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and service
bekas [8.4K]

Answer: Reconnaissance

Explanation:Reconnaissance is referred as the initial/primary phase in which the attacker/ hacker puts the every effort to gain the knowledge about the target that is collecting facts about the DNS data, network records, IP address, range of IP etc.

It is the initial step done by the attackers to do the preparation of the hacking.It is done by the two phases that is active phase and the passive phase.

3 0
4 years ago
? Question Select the correct answer from each drop-down menu. Which terms complete the sentence given below? In a presentation,
GalinKa [24]

Answer:

B

Explanation:

Animations are used for cool transitions!

8 0
3 years ago
Other questions:
  • Write a program that calls fork(). Before calling fork(), have the main process access a variable (e.g., x) and set its value to
    5·1 answer
  • Programmers say the data items are ____ only within the module in which they are declared.
    5·1 answer
  • What is the maximum data transfer rate of an ieee 1394a device?
    5·1 answer
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of
    15·2 answers
  • Suppose that a is a one-dimensional array of ints with a length of at least 2. Which of the following code fragments successfull
    8·1 answer
  • The first thing you should select if you're using an Address Block or Greeting Line is
    11·1 answer
  • Discuss how does a Modulus Operator function
    7·1 answer
  • Before you enter an intersection on a green light make sure
    14·2 answers
  • When creating a document template, you can either start from an existing document or begin from _____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!