1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
7

Which of the following uses replication to Infect multiple computers?

Computers and Technology
2 answers:
ArbitrLikvidat [17]3 years ago
6 0

Answer:

trojan house

Explanation:

i just took the house

Nikolay [14]3 years ago
3 0

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

You might be interested in
Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and u
vlabodo [156]

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main() //defining main method

{

const int NUM_GUESSES = 3;//defining an integer constant variable NUM_GUESSES

int userGuesses[NUM_GUESSES];//defining an array userGuesses

int i = 0;//defining integer variable i

for(i=0;i<NUM_GUESSES;i++)//defining for loop for input value

{

cin>>userGuesses[i];//input array from the user end  

}

for (i = 0; i < NUM_GUESSES; ++i)//defining for loop fore print value  

{

cout <<userGuesses[i] << " ";//print array value with a space

}

return 0;

}

Output:

9

5

2

9 5 2  

Explanation:

In the above-given program, an integer constant variable NUM_GUESSES is defined that holds an integer value, in the next step, an integer array "userGuesses" is defined, which holds NUM_GUESSES value.

In the next step, two for loop is defined, in the first loop, it is used for an input value, and in the second loop, it prints the array value.    

6 0
3 years ago
Technology can help governments handle economic emergencies, such as the reliance on automation. Crop and resource shortages. Th
uranmaximum [27]

Answer

Technology can help government handle economic emergencies such as crop and resource shortages.

Explanation

The government can address the concerns of food shortages and water scarcity through embracing new technology interventions to increase farm yields and mitigate the impacts of water shortages. Through crop protection methods, weeds and pest can be controlled. Drip irrigation technology applies water directly to the roots of crops to facilitate high crop production. Other technologies to apply can include organic agriculture and integrated soil fertility management.



3 0
3 years ago
Read 2 more answers
Which class members should be declared as public?
yawa3891 [41]

Answer:

B. Methods and occasionally final attributes

Explanation:

In Computer programming, class members can be defined as the members of a class that typically represents or indicates the behavior and data contained in a class.

Basically, the members of a class are declared in a class, as well as all classes in its inheritance hierarchy except for destructors and constructors.

In a class, member variables are mainly known as its attributes while its member function are seldomly referred to as its methods or behaviors.

One of the main benefits and importance of using classes is that classes helps to protect and safely guard their member variables and methods by controlling access from other objects.

Therefore, the class members which should be declared as public are methods and occasionally final attributes because a public access modifier can be accessed from anywhere such as within the current or external assembly, as there are no restrictions on its access.

6 0
3 years ago
What does ALU stand for?
ValentinkaMS [17]
It stands for arithmetic logic unit 
3 0
4 years ago
Read 2 more answers
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Other questions:
  • Name format Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastN
    14·2 answers
  • Create short names for the terms below based on the naming conventions rules.
    14·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • Atari licensed a game from taito that became a smash-hit and helped sell the vcs/2600. what is the name of that game?
    14·2 answers
  • Users generally do not understand the concept of network drive sharing. they only know they can store their files "on my f: driv
    8·1 answer
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • : How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others?
    10·1 answer
  • A set of parentheses that contain zero or more arguments
    12·1 answer
  • What is a non-example for job application???
    11·1 answer
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!