1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
5

You downloaded a picture that a friend sent you on social media, but when you opened it, you noticed that another unfamiliar pro

gram was downloaded as well. What attack are you a victim of?
Phishing

Malware
Computers and Technology
1 answer:
solmaris [256]3 years ago
3 0

Answer:

Malware.

Explanation:

You might be interested in
A software program that allows a programmer to type in code. modern versions usually make it easy to format the code on the scre
Daniel [21]
Hi!

Software programs which programmers use to write code are known as IDE's. IDE stands for an integrated development environment.

It is also sometimes called an interactive development environment.

Hopefully, this helps!
4 0
4 years ago
For all programs, you should write a small amount of code and _______
IrinaK [193]

Answer:

test

Explanation:

One newly popular development paradigm is "test-driven development"; which borrows agile engineering principles in architecting project components.

8 0
3 years ago
Who can add entries to value log
miskamm [114]

Answer:

b

Explanation:

3 0
3 years ago
Why do computers use binary code?
Anna71 [15]

Answer:

To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand

4 0
3 years ago
Read 2 more answers
Please help me with these questions
adelina 88 [10]

3. A, (first choice)

4. C (Third choice from top)


6 0
3 years ago
Other questions:
  • What ipconfig command line option can be used to delete cached dns information from memory?​?
    9·1 answer
  • The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
    10·2 answers
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • The function below takes two parameters: a string parameter: CSV_string and an integer index. This string parameter will hold a
    14·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • The exponential distribution is often used to model what in a queuing system?
    12·1 answer
  • Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th
    9·2 answers
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • PLEASE HELP! :)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!