1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
15

Need help with 4.7 lesson practice

Computers and Technology
1 answer:
OverLord2011 [107]3 years ago
7 0

Answer:

1.a

2.sorry cant read it that wekk

3.c

Explanation:

You might be interested in
Trojan Horse is a malicious program and a virus is a program. <br><br> a. True <br> b. False
SOVA2 [1]

Answer:

b. False.

Explanation:

Trojan Horse is a malware (malicious software/program) that can take over control of your machine. Trojan begins its action once it has been installed on the machine. With Trojan, hackers can have access to spy on a machine on which the Trojan has been installed thereby enabling them unauthorized access to sensitive data on the machine. With Trojan, user data can be blocked, stolen and even deleted.

A virus is also a malicious program just like Trojan. But unlike Trojan, a virus will replicate itself by copying itself to other programs in the affected machine thereby modifying these programs.

Both Trojan Horse (or simply Trojan) and Virus are malicious programs. Also, whether or not malicious, they are both programs. So it's superfluous to say one is a malicious program and the other is just a program.

Hope this helps!

7 0
3 years ago
Study the images of two different fronts.
myrzilka [38]

Answer:

item A is cold. B is Warm

6 0
3 years ago
Read 2 more answers
A type of graph that uses horizontal bars to compare data is called a
sergiy2304 [10]
The answer is A) a bar graph

6 0
3 years ago
Read 2 more answers
When you need to cut new external threads on a bolt, which of the following tools should you use?
Law Incorporation [45]

when your threading a bolt no specific kind you should use a die

8 0
3 years ago
Read 2 more answers
Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
Masja [62]

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

4 0
3 years ago
Other questions:
  • You should hand write your references on your resume.
    15·2 answers
  • Write a function max arguments. write a program that reads three floating-point numbers, uses the max function, and displays the
    5·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    14·2 answers
  • Which programming language was released first
    7·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • Who created fortnite
    15·2 answers
  • How to delete Brainly account ?​
    12·1 answer
  • What is a field on a table
    13·1 answer
  • Python program oranges and apples 3.4.6 copy and paste would be nice
    7·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!