1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
5

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle

d
Computers and Technology
1 answer:
yuradex [85]3 years ago
4 0

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

You might be interested in
BlockPy: #38.2) While Input Use a while loop to repeatedly take input from the user and print whatever they type in. When the us
BARSIC [14]

Answer:

strr=input("please enter something: ")

while strr is not "":

   print(strr)

   strr=input("please enter something: ")

Explanation:

whenever the user will enter an empty string the loop will terminate

8 0
4 years ago
Cleo received a message from Joline that was sent to her as well as two other coworkers named Sam and Thomas. Cleo
babymother [125]

Answer:

Cleo would choose the option "Forward"

Explanation:

Reply means reply to a single person

Reply All means to reply to the entire thread

Forward means to send the email to another

Copy means to copy the email, but it doesn't send

7 0
3 years ago
Read 2 more answers
Which option helps you choose the design of a slide in a presentation A) slide layout b) shapes c) animation d) slide transition
mihalych1998 [28]

Answer:

B) slide layout

Explanation:

Slide layout, since you can choose what type of design you want, I'm guessing this is for power point.

8 0
3 years ago
Read 2 more answers
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
4 years ago
Importance of good safe design
KengaRu [80]

Answer:

Safe design incorporates ergonomics principles as well as good work design. Good work design helps ensure workplace hazards and risks are eliminated or minimised so all workers remain healthy and safe at work.

Explanation:

Good work design, or safety in design, considers hazards and risks as early as possible in the planning and design process. It aims to eliminate or minimise the possibility of workplace injury or illness throughout the life of the product or process. ... products. layout and configuration

3 0
3 years ago
Read 2 more answers
Other questions:
  • Add the following methods to the ArrayCollection class, and create a test driver for each to show that they work correctly. In o
    5·1 answer
  • Your ___________ is what you can see without the presence of an obstruction.
    8·1 answer
  • Protected base class members cannot be accessed by: a.friends of the base class.
    6·1 answer
  • You receive a file named Project4.xlsx as an attachment to an email message. What do you expect the file to contain?
    8·1 answer
  • The text size can be found in ?
    9·1 answer
  • Application servers are usually grouped into two types: page-based and _____ systems.
    6·1 answer
  • Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
    7·1 answer
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • Which best describes sorting, filtering, and deleting records?
    6·1 answer
  • 3. What report shows what mobile devices were used to view a website?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!