mariamheny3766 mariamheny3766
  • 04-08-2017
  • Computers and Technology
contestada

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Respuesta :

kphung76127
kphung76127 kphung76127
  • 04-08-2017
The best answer is A, viruses.
Answer Link

Otras preguntas

Write an equation for the line parallel to the given line that contains C. C(4,7); y = - 2x + 1 (Type your answer in slope-intercept form.)
Solve 2(x-6)+7x = 5-3(x-2)
Directions - Graph the following slope intercept equation:y=-1/3x+4
Find the equation of the line through the point (1,-4) that is parallel to the line with equation -13x-3y=-66
15. WORK REQUIRED: Given : ZA = 2D and BA – ED. What congruent sides would allow us to use SAS to prove Triangle ABC is congruent to Triangle DEF? (write your a
Linear function ху 60 10-8 The values in the table represent a linear function. How does the value of y change in relation to a change in the value of x? A) for
Three Turtles are racing . Abe the turtle's distance is represented by the green line, Benji the turtle's distance is represented by the red line, and Car
Look again at the table of refrigerator sizes and prices. Is the relation a function?A. The relation is not a function. All input values are paired with only on
when you compare the 2016-2017 season with the 2017-2018 season, what was the percent increase in the number of games that the Lakers won ? show your work.
The weighted voting systems for the voters A, B, C, ... are given in the form q: w1, w2, w3, w4, ..., wn. The weight of voter A is w1, the weight of voter B is