Answer: trojan horse virus
Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's
personal information like password information, or they may simply use it to destroy programs or data on the hard disk.
Answer:
The first one. Important notice sum should be equal to zero before calculating the total sum.
<u>Client-server</u> implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own.
<u>Explanation:</u>
The client-server can be utilized on the web just as on a neighborhood (LAN). Instances of customer server frameworks on the web incorporate internet browsers and web servers, FTP customers and servers, and the DNS. Different hosts get to those assets yet don't have administrations of their own. Since it permits arrange permits numerous PCs/gadgets to interface with each other and offer assets.
Answer:
u look se33y yessir
Explanation:
......................................