1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
10

7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i

nformation C. give an attacker full control over a system D. all of the above Answer: ________
Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

You might be interested in
lance has three tables in his database. He wants to generate a report to show data from the three tables. Therefore, he decides
Masja [62]

Two of the three tables in his database should have foreign keys that link to primary keys in one of the other tables. That way he can join the tables together.

7 0
3 years ago
Read 2 more answers
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
Liula [17]
He should launch an M-commerce app
5 0
2 years ago
PLEASE HELP!
larisa [96]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Complete the code.
Dmitrij [34]

<u>Answer</u> : Float

<u>Explanation</u> :

Complete the code.

import csv

inFile = open ("one.txt","r")

outFile = open("another.txt", "w")

myReader = csv.reader(inFile)

for item in myReader:

aWord = item[0]

aNumber = float(item[1]) + 0.4

line = aWord + "," + str(aNumber) + 'Float'

outFile.write(line)

3 0
3 years ago
Other questions:
  • A website sells illegal and counterfeited materials. According to which law can the US Attorney General seek a court order to re
    5·2 answers
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • Daisy, an HR executive at Matrix-Solutions, was given the responsibility to conduct induction training for the newly hired emplo
    10·1 answer
  • Define the term unique key and give an example.
    6·1 answer
  • What features are provided by most GUIs?
    7·1 answer
  • How does the government is i.t to run the country?
    9·1 answer
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • How do i automate survey monkey results to my email
    11·1 answer
  • True and false 1. Trace topology is also referred to as tree bus topology. ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!