1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
2 years ago
8

Which of these apps could be a Trojan Horse designed to install malware on your system? Select all that apply. *

Computers and Technology
1 answer:
____ [38]2 years ago
7 0

Answer:

Probably the third one

Explanation:

The ring tone apps are most likely designed to do that kind of stuff

You might be interested in
Describe at least one reason why transitioning from the Cisco implementation of STP to the Cisco implementation of RSTP is seaml
kherson [118]

Answer:

STP mainly uses 5 states in a network, in which some states are replaced in RSTP which improves the time efficiency.

Explanation:

STP mainly uses five states i.e.  Learning, Listening, Blocking, Disabling and Forwarding to overcome the problem of collision in a network.  

RSTP replaced the three states of STP i.e listening, learning, and blocking by Discarding, which results in the time efficiency as compared to STP.  

As STP takes minutes to complete the network inter connectivity, RSTP completes it in seconds.

This is one of the main reason why an administrator want to change to RSTP.

6 0
3 years ago
The quality of an image is compromised when, what are stretched ?​
german

Answer:

pixels

Explanation:

3 0
3 years ago
The type of cover letter written in response to a posted job opening
amm1812

Answer:

C

Explanation:

I don't have one but I hope you get an A.

I hope this helped

                     

4 0
3 years ago
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
Data collection begins only after completing the research design process. after determining whether there are any objections. wh
Ivahew [28]

Answer:

Data collection begins only

after completing the research design process.

Explanation:

The nature of the research problem and design process provides the basis for data collection.  Data collection can be carried out from primary or secondary sources or both.  The collection system will indicate if the research is exploratory, descriptive, or conclusive.  Data collection provides an important way to understand the characteristics of the research interest.  A clear definition of the research interest is provided by a correct research question, which also provides focus and direction for the study.

8 0
3 years ago
Other questions:
  • Can you help me correct a sentence?
    13·1 answer
  • A poker hand consists of 5 cards drawn at random without replacement from a 52 card deck. Using python and the cards data frame
    12·1 answer
  • Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
    15·1 answer
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • All of the following are benefits of automation except
    5·1 answer
  • Among object-oriented languages, one feature that varies considerably is whether the language allows multiple inheritance. C++ d
    5·1 answer
  • Case Study/Scenario: First, Julio clicks Tools from the Chrome menu on the toolbar. Next, he looks for Manage Add-Ons but can no
    9·1 answer
  • Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC or the all-purpose PCs you
    5·1 answer
  • True or False, In adversarial searching, agents using the MiniMax algorithm always select the state that has the highest guarant
    15·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!