1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
Kipish [7]

Answer:

i think a

Explanation:sorry

sorry im wrong

4 0
2 years ago
Read 2 more answers
Which of the following is not an advantage of e-commerce for consumers?
matrenka [14]

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

3 0
2 years ago
Read 2 more answers
9. The voltage of a replacement capacitor must
nasty-shy [4]

Answer:

B

Explanation:

It is the capacity (in Farad) of the capacitor that determines its behaviour in the circiut. The voltage is merely a qualification of what it can handle. Higher is "better".

6 0
3 years ago
What is looping in QBASIC​
Elden [556K]

A looping is a set of instructions which is repeated a certain number of times until a condition is met. hlo dai k xa halkhabar

3 0
2 years ago
A user profile has a login hour restrictions set to. Monday through A user profile has login hour restrictions set to. Monday th
Savatey [412]

Answer:

D

Explanation:

The user will be logged out and any unsaved work-in-progress will be lost.

In a computer program if a user has login hour restrictions this means that such a user will not be able to continue with his/her work when its past the restriction time.

Therefore at 5.01 pm the user will be logged out and any unsaved work-in-progress will be lost.

8 0
2 years ago
Other questions:
  • What languages do most of the students at Miami High School speak?
    6·2 answers
  • Ted wants to follow the StartSafe philosophy when working around electricity. Which of the following steps would be consistent w
    15·2 answers
  • What is the cell membrane used for ​
    14·2 answers
  • Ten members of a wedding party are lining up in a row for a photograph.
    8·1 answer
  • What is the definition of a digital signal?
    14·1 answer
  • Which component of a word processor displays the name of the document?
    13·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • Use the drop-down menus to complete the statements about changing mail options in Outlook.
    10·1 answer
  • How you use ict today and how will you use it tomorrow
    14·1 answer
  • Ajdbksjdnksnsd helppp​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!