1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
7

Which of the following uses replication to Infect multiple computers?

Computers and Technology
2 answers:
ArbitrLikvidat [17]3 years ago
6 0

Answer:

trojan house

Explanation:

i just took the house

Nikolay [14]3 years ago
3 0

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

You might be interested in
A wet-carpet cleaner that carries it's own water supply has water pressure created by a.
QveST [7]
The correct answer of the given question above would be option D. A wet-carpet cleaner that carries it's own water supply has water pressure created by a MOTOR-DRIVE PUMP. T<span>his product is easy to use, strong, and highly durable. Hope this answers your question. Have a great day!</span>
8 0
3 years ago
Read 2 more answers
Who is mostly affected by computer viruses?
Komok [63]
People who use Windows OS.
3 0
3 years ago
Which describes the third step in visual character development
allsm [11]

I would say 3-D model!!!! not 100% sure but this sounds most correct!

5 0
3 years ago
Read 2 more answers
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Exporting data is sending data to a new file. true or false
dolphi86 [110]
False__________________________
8 0
3 years ago
Read 2 more answers
Other questions:
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • Write a Python function merge_dict that takes two dictionaries(d1, d2) as parameters, and returns a modified dictionary(d1) cons
    5·1 answer
  • What is the difference between operating systems and application software?
    6·2 answers
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • What kind of fragment is near the computer?
    14·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    8·1 answer
  • What is the meaning of photography​
    5·2 answers
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
  • Why is it important for the scrum master to help the team focus on daily and iteration goals\
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!