aortiz70 aortiz70
  • 22-03-2018
  • Computers and Technology
contestada

Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as:
a. malicious code
b. trojan horse
c. hacking
d. peer-to-peer software

Respuesta :

altafmushrafp5fo2o
altafmushrafp5fo2o altafmushrafp5fo2o
  • 22-03-2018
trojan horse. They come in masked.
Answer Link

Otras preguntas

Examine the phylogenetic trees you colored and answer the following questions
LN= 6x-5 , LM= x + 7 , and MN= 3x + 20 find MN
which sentence contains the dependent clause James Madison was new to the presidency, but Dolley had already fulfilled some of the First Lady’s duties. Presiden
Which equation is an identity? 5w + 8 – w = 6w – 2(w – 4) 7m – 2 = 8m + 4 – m 8y + 9 = 8y – 3 11 – (2v + 3) = –2v – 8
Why philip II described as an absolute monarchy?
what's the place value of the underlined digit 7 in 0.724 and then round to the place of the underlined digit
Help!?!? Please and thank you
Please help! I really need help.
Can you please help mee
Why is Black Friday a frusding experience for some people? Refer to the text