1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
2 years ago
8

A ____________ is a collection of infected IT devices that an attacker or attack group controls.

Computers and Technology
1 answer:
sattari [20]2 years ago
8 0
The answer would be a Botnet .
You might be interested in
One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.
LUCKY_DIMON [66]

Answer:

A game is built from a combination of sub-tasks in order to provide the best experience to the user and make sure that the interface is comprises of only the results of the ongoing sub-tasks to provide a higher degree of data abstraction.

Data abstraction refers to the process of representing the essential information without including the background details. Rolling a dice is preferred to be a sub-task so that the user only gets to know about the result of the roll and does not have to wait for or anticipate the result. Moreover, a game may consist of n number of sub-tasks so it is not a good idea to include them in the main framework and are preferred to be abstracted.

4 0
3 years ago
A device that is connected to the Internet is known as<br> a. Nexus. Backbone. Node. Link.
ikadub [295]
A device connected to the internet is known as a Node.
3 0
3 years ago
Read 2 more answers
How can you modify elements of the Start menu?
VladimirAG [237]

Answer:

C

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following us considered to be intellectual property? Picturez or images on the internet, books, computers. Ortennis
klasskru [66]
Intellectual property is anything that has been designed, technically all of the above is a form of intellectual property. If only one answer is possible, I believe the best choice is images on the internet.

Speaking for the rest however, literary work is created and therefore the book is as well. Computers are designed so the specifications and design plans are also intellectual property. Same goes for the shoes
4 0
3 years ago
What does an Information security analysts do?
coldgirl [10]

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

4 0
3 years ago
Other questions:
  • Gary lives in an area that receives high rainfall throughout the year. Which device would be useful to him to maintain his compu
    10·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • Wich type of operating system is usually used in personal computers
    6·2 answers
  • In cell B7, enter a formula without using a function to determine the profit generated at the Downtown location by subtracting t
    9·1 answer
  • What is a computer dedicated to a single function, such as a calculator or computer game? A. TabletB. PDAC.ApplianceD. Minicompu
    6·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • Jimmy has been issued a citation for littering in a city park. When Jimmy
    8·1 answer
  • Explain how communication has helped to the staff in organization to reach their maximum delivery of service with efficience and
    11·1 answer
  • What operating system do most users use?
    13·1 answer
  • Distributed databases and data warehouses would be considered which data model type?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!