1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
Gala2k [10]

A,B,C AND D.  All depend on end user uses.

A. sites that connect you to more information on your topic

B. databases that link your topic to available sources

C. indexes on connective materials

D. shortcuts to help you narrow the search field

<u>Explanation:</u>

Boolean connectors are nothing but Boolean operators such as AND, OR, NOT, XOR,IMP, ISNOT , “=”, “>=”, “<>”,”<=” extra.

It all depends up how the end user uses in the programming languages. Normally if Boolean connector returns true value, instruction or set of instruction are used to execute for next core of action in the programming language.

Mostly in any programming language relation operators such as “=”, “>=”,”<=”,” <>” extra with his combination add on logical operators are used such as “And”, “OR” and “NOT” extra.

3 0
3 years ago
The collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out h
miskamm [114]

Answer:

1. distribution

Explanation:

Filmmaking can be defined as the art or process of directing and producing a movie for viewing in cinemas or television. The process of making a movie comprises of five (5) distinct phases and these are;

1. Development.

2. Pre-production.

3. Production.

4. Post-production.

5. Distribution.  

In this scenario, the collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film.

<em>Hence, they are likely in the distribution phase of the five phases of filmmaking.</em>

Distribution refers to the last phase of filmmaking and it is the stage where the collaborative team considers a return on investment by creating advertisements in order to have a wider outreach or audience.

6 0
3 years ago
Google Docs, MS Word, Google Slides, MS PowerPoint, Google Sheets, MS Excel In your opinion which software in each category is e
podryga [215]

Answer:

I my opinion Google software is easier to use.

Explanation:

It is more upgraded and it's basically like kind of the latest version of Microsoft Software

This is just my opinion, I use Google Applications for every single thing in  my life

7 0
3 years ago
Read 2 more answers
Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, an
tia_tia [17]

The pseudocode of the program serves as a prototype of the program

<h3>How to determine the pseudocode?</h3>

The pseudocode of the program is as follows:

  1. Start
  2. Declare array MARKS
  3. Input MARKS[0] to MARKS[9]
  4. Sort MARKS
  5. Print MARKS[9] ----- this prints the highest mark
  6. Print MARKS[0] ----- this prints the least mark
  7. FOR I = 0 TO 9; ADD MARK[I] TO TOTAL
  8. Print TOTAL
  9. Print TOTAL/10
  10. Stop

The above pseudocode gets input for the array; then sorts the array before performing the required operations

Read more about pseudocodes at:

brainly.com/question/24735155

4 0
2 years ago
How can the IOSP model help us to design an app that solves a problem?
docker41 [41]

Answer:

Definition. IOSP. Input Output Server Processor. IOSP. Integrative and Organ Systems Pharmacology (course; various locations)

Explanation:

6 0
3 years ago
Other questions:
  • A ___________ lists all possible packet switches and gives a next hop for each.
    12·1 answer
  • True or False?
    8·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    7·1 answer
  • Henry has created a software that manages a database of all his music.he wishes to run the software on another computer system t
    5·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • _KOH + _Cu(CIO3)2 - __KCIO3 +<br>_Cu(OH)2​
    12·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • Write a c++ program to print even numbers from 1 to 20​
    15·1 answer
  • hello fellows i need a help.Ineed to know about computer evolutions and computer generations.please hurry.Its my rankover questi
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!