1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
2 years ago
9

Yeah help me please......................

Computers and Technology
1 answer:
OlgaM077 [116]2 years ago
5 0
Sorry if I’m wrong, but I believe it would be the title so A dry white season
You might be interested in
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Zachary is a member of Future Business Leaders of America at his school and is competing in the Impromptu Speaking competition.
Scrat [10]

Answer:

c start off with a story

Explanation:

I just took the test

4 0
2 years ago
Read 2 more answers
Hi, I'm new. Can someone please tell me how Brainly actually works?
Bad White [126]
You just ask a question and lots of people are nice enough to help out!
6 0
3 years ago
Read 2 more answers
Which ip address type is intended for a specific host?
serg [7]

The IP address type that is intended for a specific host is the unicast. A unicast is an IP address type in which is responsible of transmitting package of data or a specific signal to a certain recipient in which it is trying to describe the sentence above as it is intended for a specific host.

5 0
3 years ago
Other questions:
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • Microsoft acknowledged that if you type a res:// url (a microsoft-devised type of url) which is longer than ____ characters in i
    9·1 answer
  • Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
    10·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • 1. A database table can hold ??
    9·1 answer
  • Which of the following might cause a shift from PPF1 to PPF2? I. A new source of high quality denim fabric. II. A new lighter me
    12·1 answer
  • What is the difference between = and == in terms of java..?
    6·2 answers
  • What is the difference<br> difference between<br> Open<br> and recent<br> command?
    7·1 answer
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!