1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
HELP GENIUS Rank :))) DoNT answer If you don't know
RideAnS [48]

An instance in my life where I rendered services was when I worked in a grocery store.

The roles of entrepreneur include:

  • Allocating employees duties.
  • Improving standard of living.
  • Taking risks.

The three challenges that a young entrepreneur faces today include:

  • Financial instability.
  • Conflicts with education.
  • Lack of business skills.

The top three characteristics of an entrepreneur include:

  • Innovation.
  • Confidence
  • Risk taking

<h3>Who's an entrepreneur?</h3>

It should be noted that a entrepreneur is an individual who owns business and take risks.

The roles of entrepreneur include allocating employees duties, improving standard of living, and taking risks

Learn more about entrepreneur on:

brainly.com/question/353543

#SPJ1

3 0
1 year ago
What is a program that, when installed on a computer, records every keystroke and mouse click?
Mrac [35]
"Key logger" This could be software or hardware that does this.
6 0
3 years ago
Whoever understands this first and replies will be the brainliest.<br><br><br><br> Road work ahead?
Scorpion4ik [409]

I SURE HOPE IT DOES (this is the best vibe if you dont get this you are an uncultured swine)

7 0
3 years ago
Read 2 more answers
The inflationary gap occurs when you obtain no increase in output, but only an increase in the Average Price Level from an incre
Dafna11 [192]
<span>B. Second phase of the Keynesian LRAS Curve.</span>
5 0
3 years ago
Energy vampire devices can draw power even when they are turned off or in standby mode?
just olya [345]
Yes that is correct.
3 0
3 years ago
Other questions:
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • What are the different components of the cloud architecture?
    5·2 answers
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • The phrase has become an Internet buzz word. It refers to a top-level domain name for communications organizations.TrueFalse
    12·1 answer
  • Choose the risks from the options below to presenting yourself differently online than offline?
    12·1 answer
  • The radix sort
    14·1 answer
  • Maria works for MegaCorp, a large privately owned company specializing in sales of ball bearings. MegaCorp introduces filtering
    15·1 answer
  • "if" statements are part of creating computer programs, what are these instructions called and how would you use them?
    11·2 answers
  • A(n) ________ will clear all user data and setting changes, returning the device's software to the state it was in when it left
    6·1 answer
  • The impact of the destruction of train station on the budget of the minister of finance
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!