1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
2 years ago
14

Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering

Computers and Technology
1 answer:
Helen [10]2 years ago
7 0

Trojans depend on social engineering to spread.

Social engineering refers to malicious activities accomplished through human interactions.

Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Trojan horses take advantage of the people who need a certain program to operate on their computer system. They use social engineering to bait in endpoint users to download the fake programs.

Find out more on Trojan horses at: brainly.com/question/354438

You might be interested in
These data provides the responses of 10 students in class A and in class B who were asked how many hours they slept lastThese da
dmitriy555 [2]

Answer:

Answer C

Explanation:

Class A Median: 4, 5, 6, 6, 7, 7, 7, 7, 8, 8

The Median of Class A is 7.

Class B Median: 5, 6, 6, 6, 7, 7, 7, 8, 8, 9

The Median of Class B is 7.

Class A Mean: 4 + 5 + 6 + 6 + 7 + 7 + 7 + 7 + 8 + 8 = 65

To find the mean, you add all of the numbers together, and divide the total by the amount of numbers. (There are ten numbers in the equation, so we divide 65 by 10.)

65/10 = 6.5, This means that the mean of Class A is 6.5

Class B Mean: 5 + 6 + 6 + 6 + 7 + 7 + 7 + 8 + 8 + 9 = 69

Do the same thing as last time, divide 69 by 10. (6.9)

The mean of class B is 6.9

Answer A and B are both incorrect, because the medians for both classes were the same.  Answer C is correct, because the mean of class B was 6.9 and the mean of Class A was 6.5

Answer D is also incorrect, 6.9 is 0.4 greater than 6.5

Solved by Inspire! (14 years old)

3 0
3 years ago
________ are found on the motherboard and are used to attach your hard disk.
Naya [18.7K]
<span>SATAs are found on the motherboard and are used to attach your hard disk.
</span>The SATA standard is most often used today by hard drives to communicate with a system motherboard. SATA stands for <span>Serial AT Attachment.
</span>It is a computer bus<span> interface that connects </span>host bus adapters<span> to </span>mass storage devices<span> such as </span>hard disk drives<span>, </span>optical drives<span>, and </span>solid-state drives<span>.</span>

4 0
3 years ago
Write a series of conditional tests. Print a statement describing each test and your prediction for the results of each test. Fo
N76 [4]

Answer:

this:name = 'John'

print("Is name == 'John'? I predict True.")

print(name == 'John')

print("\nIs name == 'Joy'? I predict False.")

print(car == 'Joy')

this:age = '28'

print("Is age == '28'? I predict True.")

print(age == '28')

print("\nIs age == '27'? I predict False.")

print(age == '27')

this:sex = 'Male'

print("Is sex == 'Female'? I predict True.")

print(sex == 'Female')

print("\nIs sex == 'Female'? I predict False.")

print(sex == 'Joy')

this:level = 'College'

print("Is level == 'High School'? I predict True.")

print(level == 'High School')

print("\nIs level == 'College'? I predict False.")

print(age == 'College')

Conditions 1 and 2 test for name and age

Both conditions are true

Hence, true values are returned

Conditions 3 and 4 tests for sex and level

Both conditions are false

Hence, false values are returned.

7 0
3 years ago
When working in Excel Online, what is it called when you drag the fill handle down to copy data?
SVEN [57.7K]
It’s called drag fill
5 0
3 years ago
Read 2 more answers
After adding an image to her flyer, Danica played around to see which layout would look the best. At one point, her text was on
Norma-Jean [14]

Answer:

Position Feature

Wrap text feature

Picture tools

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • Higher-speed Ethernet technologies use an electronic device known as a Hub rather than a switch True/False
    15·1 answer
  • Which of the selection below does not represent a workable IP address?
    9·1 answer
  • What will the value of x be after the following statements execute? int x = 0; int y = 5; int z = 4; x = y z * 2;
    14·1 answer
  • Using a single formatting _______ helps to make reading researched information easier; it lets the reader know what to expect.
    7·1 answer
  • Seeing an error message on the screen after you click on a link or icon may indicate that your PC doesn't have the correct _____
    15·1 answer
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • What term is used to describe our connection with eachother through technology
    6·1 answer
  • It's important to understand that even information systems that do not use computers
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!