1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
12

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.

Computers and Technology
1 answer:
VMariaS [17]3 years ago
6 0

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

You might be interested in
Using Gen/Spec, classes can be organized by using a peer-to-peer inheritanc True/false
Fiesta28 [93]

Answer: True

Explanation: Gen/Spec is the known as the general specification standard for the classes.This standard helps in bringing out the peer-to-peer relations of class.

Gen/Spec is used in class diagram because it helps in the display of the access sharing and class specification in the general form for the required instances.Thus, this standard helps in the enhancement of the class diagram and its inheritance. So, the statement given in the question is true.

5 0
3 years ago
What console can be used to enable disable start or stop a service
umka21 [38]
That would be msconfig!
5 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
3 years ago
What is the reason that friction is present in surface to surface contact?
Andrej [43]
One surface is larger than the other surface
3 0
3 years ago
A python package used in text analysis and natural language processing. True or False
allsm [11]

Answer:

"True" is the correct answer for the above question.

Explanation:

  • There are so many python package which is used in NLP and text analysis.
  • The NLP is a concept in which the system is being interact with the human language and able to understand the human language. This provide the system which is used to intract the computers and humans.
  • The library which is used in NLP are The Conqueror: NLTK, The Prince: TextBlob.
  • The above question also states that there is a library, so it is true statement.
5 0
3 years ago
Other questions:
  • If you are upgrading your operating system to Windows 7, you may not use the In-Place Upgrade Installation Option with
    14·1 answer
  • Hi I am Khine Mye and I want to ask you a question I don't know that is square root of 2 is 1.4 and how to get that 1.4 and plz
    8·1 answer
  • what is the gpa(grade point average) you need to have or you get kicked out of robotics for middle school?
    7·2 answers
  • 0x400C (in hexadecimal)?
    8·1 answer
  • You will be creating a quiz grading program. You will compare the student's answers with the correct answers, and determine if t
    15·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Victor works for a telemarketing company that is on a very tight budget. He has been tasked with finding a method for the compan
    7·2 answers
  • The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
    15·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!