1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
7

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.

Computers and Technology
2 answers:
kondaur [170]3 years ago
7 0

Answer:

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a trojan.

Explanation:

In computer security, a Trojan horse, or Trojan, is a type of computer program that claims to be useful, but is in fact harmful. It is a type of malware that, unlike computer viruses, requires that the recipient somehow launch the program, often by the Trojan hiding inside another program. For example, the program can spy on the user, make payments in the user's name, send spam or attack other computers.

The term trojan comes from the history of the Trojan horse in Greek history. According to legend, the Greeks are said to have given a giant wooden horse as a gift to the Trojans, outside the walls. When the Trojans pulled the giant horse into their city, it turned out to be full of Greek soldiers who came out of the horse and conquered the city.

masha68 [24]3 years ago
5 0

This is a trojan horse type of virus.

You might be interested in
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on mu
grandymaker [24]

Answer: Server based network

Explanation:

 The server based network is the type of network in which the special type of computer mainly handle the various networking tasks like the storing file, managing printers and authenticate the users in the system. The server based network are also responsible for run various types of application like the email and the database system.

The microsoft windows 2016 and the window 2012 are the two ideal OS (Operating system) that mainly used in the server based network.

Therefore, we use the server based network as it easy to backup and manage in the networking system.

3 0
4 years ago
Describe the Order of Operations in Java programming.
cestrela7 [59]

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction. PEMDAS is often expanded to the mnemonic "Please Excuse My Dear Aunt Sally" in schools. Canada and New Zealand use BEDMAS, standing for Brackets, Exponents, Division/Multiplication, Addition/Subtraction.

5 0
3 years ago
How can photography allow us to view the world around us in different ways?
Ymorist [56]
It captures a single moment that one might not see with a naked eye. It shows the beauty and the essence of simple things in one exact moment. And it allows the viewer to take more time to reflect on what is captured and really find meaning within it.
6 0
4 years ago
Read 2 more answers
What are examples of intermediate goals that require funding? Check all that apply.
SashulF [63]
2.) Attending college
3 0
3 years ago
Read 2 more answers
Other questions:
  • Buildings must be wired to comply with the latest National Electrical Code to ensure that, with adequate maintenance, the instal
    11·1 answer
  • Coloumn1; Criteria1: Average of best three marks (CA); CA>=40
    13·1 answer
  • What type of topology gives you a direct connection between two routers so that there is one communication path?
    14·1 answer
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    14·1 answer
  • Which type of computer is the best? laptop, tablet, or desktop
    15·2 answers
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • If you wanted to buy a house that cost $150,000 and you knew you needed a down payment of five percent, how much would you need
    8·1 answer
  • Who is the first British in Europe ​
    10·1 answer
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!