1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
2 years ago
12

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.

Computers and Technology
1 answer:
VMariaS [17]2 years ago
6 0

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

You might be interested in
Do transformers have life insurance or car insurance? If you chose life insurance, are they even alive?
ladessa [460]

Answer:

Car insurance

Explanation:

they are machines with ai

4 0
3 years ago
HELP PLS QUICK TRUE OR FALSE QUESTION
dmitriy555 [2]

Answer: I think the answer is true but I don't fully understand it sorry if im wrong.

Explanation:

8 0
2 years ago
Read 2 more answers
What is machine learning
Katyanochek1 [597]

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

5 0
2 years ago
Read 2 more answers
If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
gayaneshka [121]

Answer:

The correct answer to the following question will be "Server role migration".

Explanation:

  • A process of moving data from one data to the next. Security concerns are the causes behind the system relocation, the hardware is also being changed and several other influences.
  • With this, you are setting up a new server, either virtual or physical, running a new version of Windows (Windows Server) and then moving your positions and facilities to the newly constructed Windows Server Virtual Machine/Physical.

Therefore, it's the right answer.

3 0
3 years ago
To make a profit the price of the items sold in the furniture store are marked up by 80 %after marking up the prices each item i
Verdich [7]

Answer:

The algorithm is as follows:

1. Start

2. Display "Input Item Price: "

3. Input Price

4. Markup = Price + 80% * Price

5. Selling_Price = 10% * Markup

6. Display "The Selling Price is "+Selling_Price

7. Stop

Explanation:

This signals the beginning of the algorithm

1. Start

This is a prompt that asks for the price of the item

2. Display "Input Item Price: "

This gets the price of the item

3. Input Price

This calculates the Markup (80% of the inputted price)

4. Markup = Price + 80% * Price

This calculates the selling price (10% of the markup)

5. Selling_Price = 10% * Markup

This prints the selling price

6. Display "The Selling Price is "+Selling_Price

This signals the end of the algorithm

7. Stop

7 0
2 years ago
Other questions:
  • Why does this say I'm in middle school?
    11·1 answer
  • Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co
    10·1 answer
  • )a___ is a complete binary tree such that each node in the tree contains a comparable object that us greater than or equal to th
    9·1 answer
  • A subclass of Value, LargerValue, is defined with a getValue method that returns twice the value of the parent. Which line is th
    13·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • What is batch processing?
    12·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • HELP PLZZ FAST!!!!!
    10·2 answers
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    13·1 answer
  • Explain with examples the roles of system software and application software?<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!