Name a type of malware designed to provide unauthorized, remote access to a user's computer​

Answers

Answer 1

Answer:

spyware

Explanation:

your welcome;)

Answer 2

Answer:

trojan horse

Explanation:

or just trojan


Related Questions

Kiểm tra cặp số hứa hôn
Đầu vào : số nguyên n,m
Đầu ra : in ra n,m là cặp số hứa hôn và in ra không là số hứa hôn nếu ngược lại

Answers

Answer:

Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you


An engine that generates hot, expanding gases by burning fuel inside the machine.

Answers

Answer:

Piston engines, jet engines, and rocket engines all depend on the same basic principles to produce thrust. The engine mixes fuel with oxygen or another oxidizer in a combustion chamber. The mixture is ignited. The burning mixture creates hot, expanding gases.

Explanation:

PA BRAINLIEST

what is the different sheets in excel

Answers

Answer:

By clicking the sheet tabs at the bottom of the Excel window, you can quickly select one or more sheets. To enter or edit data on several worksheets at the same time, you can group worksheets by selecting multiple sheets. You can also format or print a selection of sheets at the same time.

Explanation:

hope this helps

Can someone pass me Unit 2 Basic Animations from CMU CS ACADEMY, I'll pay you if you pass it to me.

Answers

Answer:

i could but it depends on how much pay

Explanation:

Answer:

ii have the awmsers

Explanation:

unit two

# speedX should be -5 and speedY should be -25.

### Fix Your Code Here ###

Circle(350, 350, 50, fill='ghostWhite', border='black')

ballStitches = Oval(350, 350, 50, 95, fill='ghostWhite', borderWidth=3, dashes=True,

                   border=gradient('red', 'red', 'red', 'ghostWhite'))

gloveThumb = Oval(260, 375, 75, 120, fill='brown', border='black', rotateAngle=25)

glove = Oval(200, 375, 130, 150, fill='brown', border='black')

   # This moves the ball to be 250 away from the mouse in the x-position.

   ball.centerX = glove.centerX + 250

   ball.centerY = mouseY

   # Move the ball stitches to where the ball is.

   ### Place Your Code Here ###

ball=Circle(350, 350, 50, fill='ghostWhite', border='black')

HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!

Answers

Answer:

The explanation is for 10 inputs though. You'd have to follow these steps to find input 50 numbers.

Explanation:

This is how I wrote it in the Plain English programming language which looks like pseudo-code but compiles and runs (to save you all the rest of the steps):

To run:

Start up.

Write "Enter 10 numbers separated by spaces: " on the console.

Read a reply from the console.

Loop.

If the reply is blank, break.

Get a number from the reply.

Add 1 to a count.

Add the number to a total.

Repeat.

Write "The total is: " then the total on the console.

Put the total divided by the count into an average.

Write "The average is: " then the average on the console.

Refresh the screen.

Wait for the escape key.

Shut down.

a leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate headquarters is located in Redmond Washington and it has offices in more then 60 countries

Which One Is It

A) Apple
B) Microsoft
C) IBM
D) Global Impact​

Answers

Answer:

B

Explanation:

They have offices in Redmond Washington

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

How does tracking changes relate to sharing a workbook in Excel?

Answers

Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.

Explanation:

A workbook in excel is a file that contains one or more worksheets to assist you with data organization.

What is a workbook?

A workbook in excel is a file that contains one or more worksheets to assist you with data organization. A blank workbook or a template can be used to build a new workbook.

The Advanced tab of the Share Workbook dialogue box gives further choices for changing how Excel records change. For example, you may choose the "Automatically Every" radio option and enter a value in the "Minutes" text box. If you enter 10, Excel will store changes made by users every 10 minutes.

When you highlight changes while you work, Excel highlights any modifications (such as updates, insertions, and deletions) with a highlighting colour. Track Changes and Highlight Changes may be found on the Review tab. Select the Track changes while editing.

Learn more about Workbook:

https://brainly.com/question/10321509

#SPJ2


A machine that converts energy to useful work.

Answers

Answer:

heat engine

A heat engine is any machine which converts heat into useful work for example, a steam engine or a car engine. Real heat engines are complex and there are many ways of converting heat energy into useful work. We can abstract and generalise the workings of any heat engine into three parts:

Explanation:

CAN I GET BRAINLIEST

Which of the following is NOT a function of a Web Browser?
O Provide a platform that users can use to access web pages and sites
O Access a Web server and request a page on the Internet so the right information shows up
O Crawl through the World Wide Web searching for words and terms to index in Web Databases
O Interpret Web page's HTML tags and display the Web page's information in a way that is intended/easily readable for you

Answers

A web browser is used to gain access to the contents of a website, displaying the information in a readable and easily understandable format. Hence, an option which isn't a function of a web browser is Crawl through the World Wide Web searching for words and terms to index in Web Databases

A web browsers allows users to access web pages and sites, by accessing web servers and requesting access to display the contents.

Web pages are written in Hypertext Markup Language (HTML). Browsers interpret these document format and tags so that it is displayed in an understandable format.

Learn more : https://brainly.com/question/17130932

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists

Answers

Answer:

ICMP

Explanation:

please help!!!! what is the meaning of M,I,C,R,O,S,O,F,T word?
M-
I-
C-
R-
O-
S-
O-
F-
T-​

Answers

Answer:

Microsoft (the word being a portmanteau of "microcomputer software") was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows

Explanation:

if you need full answer this is it

Differentiate between patent and copyright.

Answers

Answer: Patent - securing an invention

Copyrights - securing original ideas

Both are governed by different rules and regulations and both are for different purposes.

Would appreciate brainly <3

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

What was the goal of the COMPETES Act of 2007?

Answers

Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."

Answer:

Increasing federal investment in scientific research to improve U.S. economic competitiveness.

Explanation:

Hope this helps!

What are the three algorithm constructs?

Answers

Answer:

The algorithm constructs are sequence, decision/selection and repetition.

Explanation:

The three algorithm constructs in C are?

Sequence.Selection.Iteration.

What are three algorithm constructs?

There are known to be 3 basic constructs in an algorithm. They are:

Linear SequenceConditionalLoop

Note that  an algorithm is a combination of instructions for handling a problem or fulfilling a task.

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ2

You arrive at your first client meeting with Jaba's Smoothie Hut. Jaba's owner, Kim, has asked you to install a Wi-Fi network for his customers. Kim has told you that the store needs the following:

Dedicated internet service with enough bandwidth to meet customer demand and run the store.
Be cost effective (Kim does not want the most expensive or the cheapest).
Customers will use Wi-Fi and the business will have 5 wired connections

Select the correct package for the Jaba's Smoothie Hut:

a. 20 Mbps service with 1 modem/Router, a 16 port switch, and 1 wireless access point
b. 100 Mbps service with 1 Modem/Router, a 24 port switch, 3 wireless access points (1 for office, 1 for retail, and 1 for outside)

Answers

The correct package which can be used to set up the Jaba's Smoothie Hut so that there would be dedicated internet service with enough bandwidth to meet customer demand and run the store is:

b. 100 Mbps service with 1 Modem/Router, a 24 port switch, 3 wireless access points (1 for office, 1 for retail, and 1 for outside)

According to the given question, we are asked to show the correct package which can be used to set up the Jaba's Smoothie Hut so that there would be dedicated internet service with enough bandwidth to meet customer demand and run the store

As a result of this, we can see that when using wireless networks (WiFi), there is a necessity to make use of a fast 100 Mbps service so that the connection would have sufficient bandwidth to meet the needs of the store and customers.

Therefore, the correct answer is Option B

Read more here:

https://brainly.com/question/18450917

What are two drawbacks of using netbook ? (Choose two)
A. Portability
B. Screen size
C. Boot up time
D. Storage capacity

Answers

Answer:

D and C

Explanation:

I would say D and C because they don't have fast processors they normally only use Celerons. and normally they only have a 64GB internal SSD.

It's definitley not a because they are extremely portable and have amazing battery life

I don't think its B because they have small screens but you can also get them in bigger 14" variants which is normally the generic size.

If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles

Answers

There are various ways to resolve conflict. Addressing conflict by the  team manage is by:

Control conflict by expanding the resource base Eliminate conflict by assigning volunteers to another project team.

There are a lot of ways an individual can handle conflict. One of which is to expand the resource base.

Example: Supporting  team manager receives 4 budget requests for $150,000 each. If he has only $200,000 to distribute, there will be conflict at this stage because each group will believe its proposal is worth funding and will not be happy if not fully funded. So the best thing to do is to expand the resources allocated.

The right way to fix this conflict is to tell your volunteers in advance that some of them will not be doing different tasks etc.

See full question below

Capital One invites employees to work on special projects during hackathons. Employees can explore new technologies, rapidly push development forward, or just expand their network to include more colleagues interested in innovation. There's always the possibility that more employees want to participate in the hackathon than there are roles available. If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles? Control conflict by expanding the resource base. Eliminate conflict by assigning volunteers to another project team.Eliminate conflict by avoiding the volunteers. Stimulate conflict by making volunteers compete for the available roles.

Learn more from

https://brainly.com/question/18103914

What symbol must go at the end of an if statement?

Answers

::::::::
a period (.)

Answer: the pireod .

Explanation:

I love dogs & cats.

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

Please help me !!!!!!!

Answers

Answer:

Explanation:

CTRL+F

To open the Find pane from the Edit View, press Ctrl+F, or click Home > Find. Find text by typing it in the Search the document for… box. Word Web App starts searching as soon as you start typing

If ClassC is derived from ClassB which is derived from ClassA, this would be an example of ________.

Answers

Answer:

Inheritance

Explanation:

What is a storage device? Give one example of Primary magnetic storage, Primary optical storage and Portable storage.

Answers

Answer:

fácil solo ve a tu almacenamiento y aprende

Primary optical storage

Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS

Answers

Answer:

ANS is no.B and no. C

hope it helps

Discuss some of the reasons you feel that people have for either liking or disliking Excel

Answers

It depends on what you’re talking about liking or disliking like are you talking about food or people

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?

Answers

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

https://brainly.com/question/2780939

Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC. What differences would you expect to see between a dedicated 3D animation workstation and a typical PC

Answers

I'm no expert here, as I don't own a workstation but rather a gaming pc. But hey, I did tons of research on pc components and I think I can answer your question.

A dedicated workstation would be FAR more capable of running 3d applications, given how demanding they can get than a personal PC. You'd instantly regret using a typical pc for 3d rendering, even a top of the line gaming pc. Point is, gpus created by nvidia are far more capable of running graphic intensive programs specifically made for work than any other gpu. If you want to be satisfied, i'd advise you go for a workstation (Plus they're so much easier to get your hands on than a gaming rig).

1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​

Answers

Answer:

e

Explanation:

e

Given an array of String objects, use streams to count how many have a length less than or equal to three. StringLengthDemo.java

Answers

The array of String objects, use to count how many have a length less than

or equal to three is as follows:

string_object = ["brainly", "mathematics", "boy", "girl", "us", "joy", "key"]

x = []

for i in string_object:

   if len(i) <= 3:

       x.append(i)

print(len(x))

The code is written in python

The string array is declared.

Then an empty variable array is declared.

Then we loop through the array.

If any of the string length in the array is less than or equals to 3 , we append it to the empty array.

Then finally, we print the counted number of strings

learn more: https://brainly.com/question/22081416?referrer=searchResults

Other Questions
Label the process in the carbon cycle Obesity is a digestive system issue for which of the following age groups? Is it possible to find gold in sedimentary rocks? If so, how? If not, why not? esearch on transformational and transactional leadership shows a. transactional leadership is more effective than transformational leadership. b. transactional leaders have little to no influence on employee attitudes. c. transformational leaders create higher levels of commitment to organizational change efforts. d. transactional leaders increase the intrinsic motivation of their followers. How do I check my answer?!?? 6.78J-5.2=4.33J+2.15. J=3Please answer ! The circumference of a circle is 20pi m. find its diameter,in meters Annals write synonym 29 Community psychology came of age in the its aim was to minimize psychological disorders.Multiple Choice 1980s 19601970s 1990s Explain the extent to which this excerpt of the Bhagavad Gita is a reliable source of evidence about Hindu religious beliefs. Lamb to the slaughter Identify the details the author uses to develop Mary Maloneys character. Use the fishbone diagram to record direct and/or indirect characterization of Mary Maloney. You will choose 6 character traits to describe Mary. For each character trait you will provide a specific example from the story to support your chosen trait.You may use direct quotes from the story as evidence for each point or you can paraphrase the example. Please help! 20 Points! Will give brainliest if correct! pls help asap! i will mark brainliest! Ivy bought a bike for $67.82. The sales tax was $4.79. How much money did Ivy spend on the bike before taxes? Escriba un poema usando 4 de las siguientes palabras: lluvia, nieve, lluvia, granizo, tornado, huracanes, frente clido, frente fro, alta presin, baja presin, termmetro, barmetro, anemmetro, pluvimetro, veleta o higrmetro. plis aydenme porfa 1) An airplane is at 10,000 feet above the ground. It needs to fly higher to reach the regular flying height. It increases its height at a constant rate of 2,000 feet per minute. How high will the plane be in 10 minutes? examine the structure of the poem "the songs of the women of my homeland" What was wilson known as in the red badge of courage There are 13 pieces of chicken at the dinner table. After dinner, only 3 pieces are left. How many pieces were eaten at dinner?168710 Mercedes can download new songs for $1.39 each. Write an equation to show how many songs she can download for $15.00. (1 point)15x = 1.3915 + x = 1.391.39x = 151.39 + x = 15 What is the answer to n?