1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
12

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.

Computers and Technology
1 answer:
VMariaS [17]3 years ago
6 0

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

You might be interested in
How is the OR (||) logical operator used?<br> PLS HURRY
3241004551 [841]

Answer:

The answer is below

Explanation:

A logical operator is a symbol or word used to connect two or more expressions such that the value of the compound expression produced depends only on that of the original expressions and on the meaning of the operator. Common logical operators include AND, OR, and NOT.

4 0
3 years ago
Que se trata el RUC<br>​
mariarad [96]
No se senor i no sure
7 0
3 years ago
Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
Kipish [7]

Answer:

code = 010100000001101000101

Explanation:

Steps:

The inequality yields 2^{k} - 1 > = M+K, where M = 16. Therefore,

The second step will be to arrange the data bits and check the bits. This will be as follows:

Bit position              number              Check bits            Data Bits

21                                   10101

20                                  10100

The bits are checked up to bit position 1

Thus, the code is 010100000001101000101

3 0
4 years ago
Read 2 more answers
What's the answer to this​
yarga [219]

Answer:

S

Explanation:

The index operator will address individual characters in the string.

5 0
3 years ago
The ____________ command / function is used in Python graphics and text-based programming code.
sleet_krkn [62]

A. write()

2.4. Graphics

Graphics make programming more fun for many people. To fully introduce

graphics would involve many ideas that would be a distraction now. This section

4 0
2 years ago
Other questions:
  • The internet connects millions of computers connected through millions of ____ worldwide.
    9·1 answer
  • Select all that apply.
    13·1 answer
  • Which renewable resources are available at any time?​
    15·1 answer
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
    8·1 answer
  • I prefer a job where I am praise for good performance or I am accountable for results
    13·1 answer
  • Which best explains a password attached to a document?
    6·2 answers
  • Requests to retrieve data written in a language such as SQL are called…
    8·1 answer
  • Answer any one: write a computer program:which you know.​
    6·1 answer
  • What is the basic body structure of html.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!