1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering

Computers and Technology
1 answer:
Helen [10]3 years ago
7 0

Trojans depend on social engineering to spread.

Social engineering refers to malicious activities accomplished through human interactions.

Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Trojan horses take advantage of the people who need a certain program to operate on their computer system. They use social engineering to bait in endpoint users to download the fake programs.

Find out more on Trojan horses at: brainly.com/question/354438

You might be interested in
In your own words, explain the role of scientific investigation in the development of the Theory of Evolution.
AveGali [126]
The theory of evolution is the product of scientific investigation
7 0
3 years ago
Why does space exploration lead to new technology?
valentina_108 [34]

Answer:

C. Because materials developed for use in space are often useful to ordinary citizens.

Explanation:

A, is not correct due to the "only" word. Humans can explore space too.

B, not that either because you will need lots of technology to space travel, not less.

C, because materials that can be produced through scientists' ideas can help contribute to society and improve technology.

D, is not correct because there is no need for new materials for new technology.

5 0
3 years ago
What do i need to do to get microsoft certified?
kondaur [170]
Sign up for Gmetrix and Centriport (Console 8). THose two should explain the requirements. 

I took a class to get certified, which was Business Computer Applications, so if you're able to take that class, I suggest you do so.
6 0
3 years ago
While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is
maxonik [38]

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

6 0
3 years ago
How do i get better at rogue
marta [7]
Practice is key ! Trust the process
3 0
3 years ago
Read 2 more answers
Other questions:
  • How does a Computer chip work?
    6·2 answers
  • The disk drive is a secondary storage device that stores data by _____ encoding it onto a spinning circular disk.
    14·1 answer
  • Which of the following is the MOST likely cause of the connectivity issues?A user of the wireless network is unable to gain acce
    5·1 answer
  • The ____ area on the status bar includes six commands as well as the result of the associated calculation on the right side of t
    5·1 answer
  • NEED HELP ASAP
    13·2 answers
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
  • WILL MARK BRAINLIEST WORTH ALOT OF POINTS! HELP ME GET THIS DONE
    8·1 answer
  • When you save a new file, you use the ______ dialog box to provide a filename and select a location of the file.
    9·1 answer
  • 2. Write the pseudocode to print all multiples of 5 between 10 and 25 (including both<br> 10 and 25)
    11·1 answer
  • What is the difference between concrete language and abstract language? give an example of each.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!