1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
Physical activity such as sports or even a brisk walk can help reduce
ycow [4]
Physical activity could help reduce the chance ofheart disease
4 0
3 years ago
Read 2 more answers
Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
Dahasolnce [82]

Answer:

public: virtual void print()=0;

Explanation:

An abstract class contains a pure virtual function. Pure virtual class cannot be instantiated but it can be subclassed and the subclass can provide an implementation of the function.

A virtual function declaration in the class is preceded by the virtual keyword. For example, virtual void print();

A pure virtual function declaration is followed by '=0;'

public: virtual void print()=0;

4 0
3 years ago
What is the output of this program?
Charra [1.4K]

Answer:

20

Explanation:

assuming the print statement is not indented, the program effectively calculates 2+5+6+7.

The range(...) is <em>excluding </em>the end value (8 in this case).

3 0
2 years ago
Read 2 more answers
What function(s) does an interpreter perform with the instructions in a high-level programming language?
allochka39001 [22]

Answer:

Translates and Executes.

Explanation:

5 0
3 years ago
Which is used to identify the network portion and the host portion of an ip address?
qwelly [4]
<span>subnet mask is used to identify the network portion and the host portion of an ip address.</span>
3 0
3 years ago
Other questions:
  • The transport layer protocol used by the tcp / ip suite that does not provide guarantees on ordering or confirmation of receipt
    7·1 answer
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • Scientific models can be used for a variety of different purposes. Which of the following statements about scientific models is
    7·2 answers
  • Which command will display the current contents of non-volatile random-access memory (nvram)?
    14·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • Q. Which protocol would best serve to authorize users to access directory services?
    8·1 answer
  • Find different between manocots and dicots clarify with example​
    14·1 answer
  • How was data put into the Tabulating Machine?
    7·1 answer
  • Fiona was talking to her colleagues about how advancements in digital technology had a negative effect on her life. Which aspect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!