1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
What function would you use to calculate the total interest paid for the first year of a mortgage?.
WITCHER [35]

Answer:

To calculate the total interest paid for the first year of a mortgage, the formula M = [P.r (1+r)n] / [(1+r)n-1] × 12 can be used.

Explanation:

3 0
2 years ago
Is the type of vision useful in sending motion and objects outside normal vision
nlexa [21]
Yes it is in fact it is usful
8 0
3 years ago
How to connect local account to domain account?
muminat
<span>Join them to the domain
Login with their domain credentials, logout
Login as local administrator (not the old account, not the new one, a 3rd local admin)
Right click My Computer and select properties
Select advanced system settings
Go to the Advanced tab
Click settings under user profiles
Select their old profile you want and click Copy to
Browse to the location of their new profile and overwrite it</span>

If the Copy button is grayed out then reboot and repeat steps two to nine.

8 0
3 years ago
During what stage of problem solving is information gathered in order to see if the plan produced the intended outcome?
Margarita [4]

Answer:

evaluation of the results

8 0
3 years ago
Write a Short note on Importance of being a good child​
marysya [2.9K]

Answer:

<em><u>Understand that people are learning from you in ways that you may never know. Other people need you to be human to the fullest. More importantly, you need yourself to be human to the fullest. When you make mistakes, take responsibility and learn from them.</u></em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • In windows, a(n) ________ follows the file name and a period and indicates the file type.
    9·1 answer
  • The advent of optical discs was made possible by developments in ____ technology.
    5·1 answer
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • What devices gives input​
    5·1 answer
  • What is multimedia computer system​
    7·1 answer
  • I need help pls help me
    8·1 answer
  • in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet acces
    5·1 answer
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!