1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
8

What is a trojan horse

Computers and Technology
2 answers:
denpristay [2]3 years ago
7 0

Answer:

Giant wooden horse that people can hide in

Explanation:

Daniel [21]3 years ago
3 0

The Greeks were laying siege to the city of Troy, and the war had dragged on for ten years. They built a wooden horse, which they left outside the city. The Trojans believed the horse was a peace offering and dragged it inside their city.

You might be interested in
An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
klio [65]

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

8 0
3 years ago
Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the
zmey [24]

Answer:

part (a).

The program in cpp is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   std::cout << "Loan balance: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>0)

   {

       if(balance<payment)    

         { payment = balance;}

       else

       {  

           std::cout << balance <<"\t\t\t"<< payment << std::endl;

           balance = balance - payment;

       }

   }

   return 0;

}

part (b).

The modified program from part (a), is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   double charge=0.01;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   balance = balance +( balance*charge );

   std::cout << "Loan balance with 1% finance charge: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>payment)

   {

           std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

           balance = balance +( balance*charge );

           balance = balance - payment;

       }

   if(balance<payment)    

         { payment = balance;}          

   std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

   return 0;

}

Explanation:

1. The variables to hold the loan balance and the monthly payment are declared as double.

2. The program asks the user to enter the loan balance and monthly payment respectively which are stored in the declared variables.  

3. Inside a while loop, the loan balance and monthly payment for each month is computed with and without finance charges in part (a) and part (b) respectively.

4. The computed values are displayed for each month till the loan balance becomes zero.

5. The output for both part (a) and part (b) are attached as images.

4 0
3 years ago
Will give brainliest
Semmy [17]

Answer:

Computer programmers may advance as project leaders or software developers.

4 0
2 years ago
What are the different types database of end users? Discuss the main activi-ties of each
disa [49]

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

8 0
3 years ago
Read 2 more answers
: how do network effects help facebook fend off smaller social-networking rivals?
Charra [1.4K]
How do network effects help Facebook fend off smaller social-networking rivals? The way a network effect works it that one user of a good or service determine the value of the product to other people. Depending on how many people use the product or service, allows the network to see the value they believe it holds. Because Facebook has billions of users, they have a high value and strong network. 
5 0
4 years ago
Other questions:
  • Which option marks all modification made within a document? Review Comment Track Changes Balloons
    15·2 answers
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • Como funciona la televisión
    7·1 answer
  • How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be re
    11·1 answer
  • Viruses and worms can affect a system by:
    11·2 answers
  • When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for di
    6·2 answers
  • Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a lik
    5·1 answer
  • What is the dark web and what is the .onion domain
    15·2 answers
  • In your own words, how are sources of income and expenses related to
    12·2 answers
  • You're as smooth as Tennessee whiskey
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!