1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
10

7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i

nformation C. give an attacker full control over a system D. all of the above Answer: ________
Computers and Technology
1 answer:
beks73 [17]3 years ago
4 0

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

You might be interested in
____ allows you to control how objects enter, move on and exit slides
coldgirl [10]
The mouse allows you to do all three of those tasks
4 0
3 years ago
Write a python coding to input ten random numerical vales to a list. And display the list. Use a loop structure to enter values.
Zarrin [17]

Answer:

000110011111000010010101001001

Explanation:

8 0
3 years ago
Which of the following types of network can only be accessed by members within a private organization?
Nadya [2.5K]
An Internet (C). because (A) is written wrong and there is nothing called extranet
3 0
3 years ago
Which sentences describe the use of web development tools?
Volgvan
1 and 4 are both true, Although it looks like  1. being your correct answer.
5 0
4 years ago
(03.05 LC
Trava [24]

Answer:

B. both primary and secondary sources.

Explanation:

Information can be defined as processed data that can be used to perform specific tasks or job functions. The two (2) main sources of information are;

I. Primary source: this type of source comprises of raw information that are first-hand in nature i.e a personal experience or witness of an event (occurrence).

II. Secondary source: this type of source relies solely on the primary source for its information and as such it comprises of second-hand information provided by other authors or researchers.

A reliable source is an information source that is unbiased, trustworthy and reliable. Also, a reliable source is typically backed up by evidence from various information channels and should be accurate.

In order to validate a reliable source, it is necessary that the information provided is checked against other credible sources to verify its accuracy.

This simply means that, if you got an information (data) from any source such as newspaper, website, television, books, radio or anywhere else, you should confirm the credibility and reliability of these information by verifying from one or more sources listed in the reference.

Hence, a reliable textbook should contain references to both primary and secondary sources.

Additionally, references are citations or links to all of the sources from which an author, writer, or researcher got his or her information from. One important thing that references show a reader is that the information is well researched.

4 0
3 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
    14·1 answer
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
  • For example, sumDigits(234) returns 9 (= 2 + 3 + 4). (Hint: Use the % operator to extract digits and the / operator to remove th
    15·1 answer
  • Consider the following declaration.int[] beta = new int[3];int j;Which of the following input statements correctly input values
    11·1 answer
  • Which of the following statement about device formatting is FALSE?
    10·1 answer
  • Who can help me on my school we will to google meet and i share my screen
    5·1 answer
  • What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to
    9·2 answers
  • Which tag denotes the end of an element in HTML?
    8·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!