1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
11

Which TWO of these correctly describe a Trojan horse malware?

Computers and Technology
2 answers:
SpyIntel [72]3 years ago
7 0
The first one and the second one
mina [271]3 years ago
6 0
The first one and last one
You might be interested in
Question 1 of 10
ycow [4]

Answer:

Explanation:

Def f

4 0
3 years ago
State four input device that are used for playing gaming programs​
bekas [8.4K]

Answer:

Mouse, Keyboard, Headphones, Charger.

Explanation:

These can be plugged into the computer for gaming and other uses.

5 0
2 years ago
Read 2 more answers
Which method of deleting files can be used in windows xp and vista?
Makovka662 [10]
The correct answer is C.

4 0
3 years ago
how much should an organization consider moving into the cloud before full outsourcing starts making more business sense
PIT_PIT [208]

Answer:

47

Explanation:

capital steez

8 0
3 years ago
Read 2 more answers
1. The process of creating workable systems in a very short period of time is called
12345 [234]

Answer:

okay i know only 1st question and answer

answer:rapid application development

6 0
4 years ago
Other questions:
  • As faster processors are designed, a disparity has developed between the speed at which the CPU processes data and the speed at
    10·1 answer
  • Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
    5·1 answer
  • What would happen to a eukaryotic cell if all its mitochondriawere destroyed
    7·1 answer
  • The Springfork Amateur Golf Club has a tournament every weekend. The club president
    7·1 answer
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • (2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
    12·1 answer
  • Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited an
    11·1 answer
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • Which term describes a visual object such as a picture a table or text box
    15·2 answers
  • What are the advantages of using digital signals over analog signals? Scientist have found advantages when they convert digital
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!