1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
2 years ago
6

________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag

ation worms
Computers and Technology
1 answer:
pav-90 [236]2 years ago
8 0

Answer:

Worms

Explanation:

"Worms" other known as viruses, take advantage of vulnerabilities in software.

You might be interested in
The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and r
rjkz [21]

Answer: Network layer

Explanation: Network layer the third layer of the OSI model architecture which is focused on the operation of making the logical paths for the data packets so that they can flow.

The packets carry the addresses of the sender port and the destination port which is added to the header of the packet and then the path is established accordingly so that the packet can travel.

4 0
3 years ago
There are several categories of utility programs that were discussed in this unit. For this item, list one. In one to three sent
Zolol [24]

Answer:

Antivirus

Explanation:

The antivirus software is a utility program and what it basically does include: (1) detecting of virus on the computer system (2) bring to the notice of the computer user, the presence of virus on the system.

An example is Avast Antivirus.

6 0
3 years ago
What is the primary difference between universal groups and global groups in windows server 2012 r2?
zzz [600]

The primary difference between universal groups and global groups in windows server 2012 R2 is that Global groups utilize fewer data in the global catalog. So, in considering replication traffic, universal groups should be within a site. The set of all objects in an Active Directory Domain Services (AD DS) forest is called the global catalog. 

5 0
4 years ago
Will give 5star and mark brainleist
TiliK225 [7]
9. C
10. B

Hope this helps!
7 0
3 years ago
What are the coordinates of r180(R90(x,y)) if (x,y)=(-8,-4)?
faust18 [17]
It would be b 48 for the correct answer 
6 0
4 years ago
Other questions:
  • On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
    5·1 answer
  • Why is it necessary to include units when measuring and dimensioning?
    7·1 answer
  • What is the term given to the controls that let you interact with an operating system?
    11·1 answer
  • URGENTE DOY 60 PUNTOS. Porfavor alguien sabe como se llama el juego de mesa que consiste en adivinar la palabra con audifonos qu
    5·1 answer
  • Hi please help ASAP it's about html!​
    15·1 answer
  • Draw a flowchart diagram for a program that displays numbers 1 to 20
    12·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Digital computers use a........ system to encode date and programs.<br>​
    8·1 answer
  • Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
    10·1 answer
  • How desktop case or chassis designed?, material and steps?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!