1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering

Computers and Technology
1 answer:
Helen [10]3 years ago
7 0

Trojans depend on social engineering to spread.

Social engineering refers to malicious activities accomplished through human interactions.

Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Trojan horses take advantage of the people who need a certain program to operate on their computer system. They use social engineering to bait in endpoint users to download the fake programs.

Find out more on Trojan horses at: brainly.com/question/354438

You might be interested in
Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
defon
A is the answer for this question
3 0
4 years ago
Read 2 more answers
Lian is asked to create a variable that will keep track of how many times the user has tried to enter their password. What kind
Kisachek [45]
What are the answers?

Hdhdhdgd. Oxide
4 0
3 years ago
The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
NNADVOKAT [17]
1970-80s which is when some of the first computers were created like apple computers which looked like a giant cube and a rectangle on the side which is very different than what we have today.

Hope this helps!
3 0
4 years ago
Name two word processor<br><br>​
Irina18 [472]

Answer:

the bat hunter

Explanation:

3 0
4 years ago
Create a Word document or text file named Part3 that contains answers to the following:
Gnoma [55]

Answer:

11111

Explanation:

4 0
3 years ago
Other questions:
  • Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page.
    6·1 answer
  • Drivers must always yield to emergency vehicles traveling
    9·1 answer
  • Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
    7·1 answer
  • Technician A says that if the coefficient of friction is too low, the brakes will grab.
    12·1 answer
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    11·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • Select the correct answer.
    8·1 answer
  • Resumen sobres el correo electrónico​
    6·1 answer
  • Identify the error and write correct HTML program 5 Cyber Bullying Tips&lt;\head&gt;Don't Respond Talk to a trusted adult &lt;|h
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!