1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
10

7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i

nformation C. give an attacker full control over a system D. all of the above Answer: ________
Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

You might be interested in
Match the definitions of different business communication to the type of document
Sladkaya [172]

Answer:

Convey more factual data that helps facilitate decision making  - REPORTS

Reports are made with factual data to show the condition of the subject so convey more factual data that helps in decision making.

Are one page long  - MEMORANDUMS

Memorandums are used to convey new information and are usually brief which means they take one or two pages.

Are written in a block style, with the body text aligned along the left margin  - BUSINESS LETTERS

Business letters are to be as formal as possible and this includes writing them block style and aligning the text to the left margin.

Allow attachments of files, such as images  - EMAILS

As emails are softcopy and computer based, they allow for the attachment of other files such as images, documents, audio, etc.

8 0
3 years ago
Read 2 more answers
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
STatiana [176]
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
3 0
3 years ago
Read 2 more answers
To calculate the multiple of 5
Anastasy [175]

Answer:

more information

Explanation:

lllll

5 0
3 years ago
A search engine that crawls uses
RoseWind [281]

Answer:

web crawlers or spider software

Explanation:

A search engine that crawls uses the web crawler or the spider software. And it also uses the server side JavaScript based crawlers and programming languages like Python and PHP. The search engine finds the content category through the meta keywords and directs the page to the index. The index contains details of similar types of pages, And each page has one category, and if category is not found which is rarest, a new category is being created.

7 0
3 years ago
Explain drawing and painting package.​
Murljashka [212]
Enhances drawing experiences, adds more features and adds better quality

8 0
3 years ago
Other questions:
  • How is the Task Manager helpful in displaying which resources your computer is using and how fast?
    5·2 answers
  • A cloud file system (CFS) allows users or applications to directly manipulate files that reside on the cloud.
    6·1 answer
  • Explain why an IT department and a user support group may disagree about the responsibility for the development of end-user appl
    8·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a
    9·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    13·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • If I am working in a document and wish to follow a hyperlink, what should I do?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!