1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering

Computers and Technology
1 answer:
Helen [10]3 years ago
7 0

Trojans depend on social engineering to spread.

Social engineering refers to malicious activities accomplished through human interactions.

Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Trojan horses take advantage of the people who need a certain program to operate on their computer system. They use social engineering to bait in endpoint users to download the fake programs.

Find out more on Trojan horses at: brainly.com/question/354438

You might be interested in
a user has a large amount of data that she or he needs to store. the data will not be accessed regularly, but still needs to be
Flura [38]
You need a sd card so you can store it and use it later
6 0
3 years ago
Read 2 more answers
Sino ang pinaka matalino sa math sa buong mundo​
Svetllana [295]

Answer:

lahat ng tao ay matalino kasama ka na dun kaya lang di natin ito inilalabas dahil natatamad tayo

6 0
3 years ago
Read 2 more answers
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
What type of computer is IBM 1401 ?<br><br>​
rjkz [21]

Answer:

The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.

7 0
3 years ago
What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
Phoenix [80]

Answer:The kernel provisions hardware resources to meet software requirements.

Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.

Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.

Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.

3 0
3 years ago
Other questions:
  • The process of changing a program’s internal structure without changing the way the program works is ______________.
    13·1 answer
  • Disk quotas are set using the ____ console. diskpart disk management mst windows explorer
    10·1 answer
  • What are the principal cybersecurity threats, both internal and external, and the principal safeguards that have been developed
    13·1 answer
  • Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2
    7·1 answer
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • If you wanted to share a statement of the company's financial position at a certain time, you would use a _____.
    12·2 answers
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • Word documents contain how many sections by default?
    9·1 answer
  • Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the u
    12·2 answers
  • Which tool uses images and other visual elements to provide artistic
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!