1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
2 years ago
11

Which TWO of these correctly describe a Trojan horse malware?

Computers and Technology
2 answers:
SpyIntel [72]2 years ago
7 0
The first one and the second one
mina [271]2 years ago
6 0
The first one and last one
You might be interested in
What is the full form of ALU​
Alexandra [31]

Answer: arithmetic logic unit: the part of a central processing unit that performs arithmetic and logical operations.

Srry if it is wrong

I hope it  helps you

6 0
2 years ago
Read 2 more answers
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
--- is a set of applications that manages the activities and resources of a computer.
hammer [34]
D. System Software 
is responsible for Manage activity 
4 0
3 years ago
If you type too much text on a PowerPoint slide the additional text is _____
IrinaK [193]
The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.
3 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    5·1 answer
  • While accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message app
    13·1 answer
  • Define an I/O port. Which functions are performed by it?
    10·1 answer
  • Is there a way I can put an already made sound that i created over an already made video
    6·1 answer
  • The three basic processes of memory are ______.
    10·1 answer
  • To drive defensively, you should _______________.
    15·1 answer
  • What are the features of G-mail <br><br>(Write in your own words)​
    10·2 answers
  • Krya needs help deciding which colors she should use on her web page. What can she use to help her decide.
    11·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!