what is the name of the virus that appears to be a legitimate program but when opened, it can steal passwords or destroy data?

Answers

Answer 1

Answer: A Trojan Horse

Explanation: The name is based on the famous legend, where an army was granted access under the guise of being a safe and trustworthy entity.


Related Questions

which of the following is not a radioactive element​

Answers

Answer:

Potassium is not a radioactive element.

Which method of backing up digital photographs is most prone to data loss due to software glitches? O online backup O fireproof safe O internal hard drive O external hard drive​

Answers

Answer:

External Hard Drive

Explanation:

External hard drive, method of backing up digital photographs is most prone to data loss due to software glitches. Thus, option (d) is correct.

What is software?

Software is the term for the intangible. The software is the most important aspect. Software is a collection of rules, data, or algorithms used to run machines and perform certain tasks. Apps, scripts, and programs that run on a mobile device are referred to as software.

According to the software in the computer are the mainly used and the upgrade basis. There was the operating system in the computer are the Microsoft Windows. There was the method to include the backing up digital photographs are the loss of the data to considerately the external hard drive was the backup.

As a result, the external hard drive, method of backing up digital photographs is most prone to data loss due to software glitches. Therefore, option (d) is correct.

Learn more about on software, here:

https://brainly.com/question/985406

#SPJ2

Determine whether each device is an input device, an output device, or a storage device.

Answers

it would be, A C A A D A

2. As you have learned, ironically, a large part of sound production involves visual perception. How easy or difficult did you find it to work with Audacity and OpenShot? Why? What aspects of the programs do you think could be improved? Explain.

Answers

Answer: it is very easy to work with programs such as audacity, they are real game changers. Also, they are very helpful for editing and recording audio. They could make audacity’s auto tune more beginner friendly

The ____________ command / function is used in Python graphics and text-based programming code.

A. write()
B. format()
C. display()
D. print()
readline()

Answers

A. write()

2.4. Graphics

Graphics make programming more fun for many people. To fully introduce

graphics would involve many ideas that would be a distraction now. This section

How many bits do we have in the MAC address of an Ethernet card?

Answers

Answer: It is 6 bytes (48 bits) long

Detailed Explanation:

In a LAN, each node is assigned a physical address, also known as a MAC/Ethernet address. This address is unique to each of the nodes on the LAN and is 6 bytes (48 bits) long, which is burned on the Ethernet card (also known as the network interface card)


Treating others with respect, even when they're impolite, is considered
A. good netiquette
B. being a bystander
C. advocating
D. empathy

Answers

The answer for this question is A

Treating others with respect, even when they're impolite, is considered good netiquette. The correct option is A.

What is netiquette?

Netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.

A set of guidelines known as netiquette promotes polite and appropriate online conduct.

These guidelines are crucial because they encourage effective communication, guard against misunderstandings, and show you what is appropriate in social situations when working and cooperating online.

Online communication can be made more productive with the use of netiquette, which also helps people stay clear of confusion and potential confrontation. It is considered acceptable to treat people with respect, even when they are being rude.

Thus, the correct option is A.

For more details regarding good netiquette, visit:

https://brainly.com/question/29444693

#SPJ2

In a PHP application using PDO, a _____ consists of the host, port, and name of the database that will be used to establish a connection to the database.

Answers

The PDO in PHP has data source name that enables the connection of the database.

What is PHP?

PHP is a scripting language and is used for the WebPages and the intersection to the relative database management system.

PDO is the PHP data object and can act as providing a data extraction layer for vendor-neutral lightweight data access.

The connection to the database is managed with the data source name consisting of the host, port, and name of the database.

Learn more about PHP, here:

https://brainly.com/question/14114506

#SPJ1

A series of drawn pictures (like a comic) of key visual shots of planned production for video is a/an
A encoding
B.call sheet
C.shot list
D. storyboard o IN​

Answers

Answer:

The correct answer is D) Storyboard

Explanation:

A storyboard is used during the initial planning stage of filmmaking. You draw pictures to demonstrate the general idea of what shots you want to get before actually going out and filming on a set/studio.

Question 1-4
Java, Visual Basic, Python and C++ are examples of what type of programming language?

Answers

Answer:

most useful at the system level (interacting with the operating system), like C.

Explanation:

Others are most useful at the system level (interacting with the operating system), like C. There are also high level languages used to create application programs. Such languages include C#, Java, C++, PHP, Visual Basic, Python, Ruby, Perl, JavaScript and others.

how has technology impacted the individual and the society​

Answers

Answer:It affects the life of people and changes the way of their learning, thinking, and communication.

Explanation: mark me as the brainly-est to get the best answers

why am I doing a PAT investigation ​

Answers

Answer:

personal appliance testing to ensure the device is free from electrical defects

Mention at least five devices used for digitizing data

Answers

Answer:
1. Cloud Storage Solutions
2. Digital Communication Tools
3. Cloud ERP Systems
4. CRM Platforms
5. Digital Accounting Tools

For more information, please visit: https://www.gend.co/blog/the-digitisation-tools-with-the-biggest-impact-for-business?hs_amp=true

Hope this helps!!

The scope of a variable is __________________

A. it is not possible to determine the scope of a variable in Python
B. all variables are available throughout the program
C. where it can be read or modified
D. before it is declared

Answers

Answer:

The scope of a variable is where it can be read or modified.

Write a function multiplication_tables which takes in as input an integer num, and prints out lists with the the first 10 multiples of all the numbers from 1 to num(inclusive).

Answers

The programming is done for the multiplication table that takes integer numbers and prints the table given in the picture.

What is computer programming?

The words "computer coding" and "computer programming" are sometimes used simultaneously. They do, however, differ in several ways.

Write a function multiplication tables which takes in as input an integer num, and prints out lists with the first 10 multiples of all the numbers from 1 to num(inclusive).

The programming is given below.

def multiplication_tables(num):

   for i in range(1, num+1):

       lst = []

       for j in range(1, 11):

           lst.append(i*j)

       print(lst)

# Testing the function here. ignore/remove the code below if not required

if _name_ == '__main__':

   n = int(input())

   multiplication_tables

Then the result will be given in the picture.

More about the computer programming link is given below.

https://brainly.com/question/14618533

#SPJ1

____ loses data when it stops receiving electrical power.


ANSWER OPTIONS:
A graphics processing unit (GPU)

A central processing unit (CPU)

Random-access memory (RAM)

Read-only memory (ROM)

Answers

Answer:

gpu

Explanation:

the answer is gpu a graphics processing unit

Assume that it takes 0. 01 milliseconds to access a disk block if the block is in the disk cache (i. E, in main memory) and 20 milliseconds if the block is on the disk. Assume that 3 level(s) of indexing is used and the cache hit ratio is 88%. What is the effective (average) disk access time in milliseconds (rounded to zero decimal places)

Answers

GATE | GATE-CS-2015 (Set 1) | Question 65. Consider a disk pack with a seek time of 4 milliseconds and rotational speed of 10000 rotations per minute (RPM). It has 600 sectors

What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text that is able to respond to user input and link to other objects.

Answers

The web pages contain a special kind of text that allowed to respond to the user input is termed hypertext.

What are web pages?

The web pages are given as the web server delivery with the displaying of the web browser. It is given with the HTML language and comprises several resources and information.

The web page document is accessed with the presence of the hypertext or the hyperlink that enables the user selection to respond to it.

Learn more about web pages, here:

https://brainly.com/question/9060926

#SPJ1

PLEASE HELP!!! Me turn this into a video & add liana flores- raise the moon (instrumental) in the background for the music. If you could help that would be great. Please this is due tomorrow at 11:59 PM and i don't have a phone to take a video of this and my computer is not letting me do it.

If I can mark B I will. Just please help me this is worth my entire grade for this year

Answers

Answer:

Try going to your settings and allow output camera

Explanation:

Answer:

Step 1: Export all images from the pdf using a screenshot tool (I used the built-in snip tool).

Step 2: Convert the music to an mp3.

Step 3: Combine everything together using ffmpeg.

Explanation:

The ffmpeg tool can perform many tasks. In this case, I added a filter configuration to create a nice crossfade effect. The tool has an infinite amount of options to achieve these results.

The box on a slide that has a dotted or hatch-marked border and that contains the insertion point is a text ____.

Answers

it is known as a text placeholder

Placeholder is the answer

Luka is responsible for the translation of the computer program. Luka looks for errors during the stage of a computer program.

Answers

Answer:

He should check if a syntax error pops up to fix the code

Explanation:

A syntax error message pops up when the code is not proper

Answer:

He should check for any syntax error pop-ups in the console

Explanation:

When creating a multipage website what are the two most important things to
remember?

A. Link your style sheet to each page and add an H1
B. Link your style sheet to each page and link all pages together
C. Link your style sheet to each page and add images
D. Link your style sheet to each page and style all elements

Answers

Answer:

B. Link your style sheet to each page and link all pages together

Explanation:

A. Link your style sheet to each page and add an H1

Not needed. Multipage websites don't require H1s to function

B. Link your style sheet to each page and link all pages together

Correct. Pages should be linked together so the website can be navigable.

C. Link your style sheet to each page and add images

Not needed. Multipage websites don't require images to function.

D. Link your style sheet to each page and style all elements

Not needed. You don't need to style every element.

Define a class in Java to accept and store the list of 10 names in an array. Print the
names with even number of characters.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

String[] strs = new String[10];

java.util.Scanner sc = new java.util.Scanner(System.in);

    for(int i = 0; i < 10; i++){

        System.out.print("Enter string " + (i+1) + ":");

        strs[i] = sc.nextLine();

    }

    System.out.println("The strigs with even number of characters is");

    for(int i = 0; i < strs.length;i++){

        if(strs[i].length() % 2 == 0){

            System.out.println(strs[i]);

        }

    }

}

}

Explanation:

Which of the following are exclusively associated with copyright protection

Answers

u got picture of the question?
You need a picture otherwise I can’t answer

Enter a reference to the remaining balance of payment 1 in cell b13. use the fill handle to copy the functions created in the prior steps down to complete the amortization table.

Answers

The steps described above are actions that are performed while editing an Excel Worksheet. See definitions below.

What is a reference in a Worksheet?

In a worksheet, a cell or range of cells that can be used to create a formula so that the values in those cells can be identified by the program in the worksheet to execute a calculation is referred to as Reference.

Functions on the other hand are formulas that have already been preset onto the worksheet and can be called up and used during a calculation or analysis.

A cell is the smallest unit in a worksheet.

It is to be noted that the Amortization Table indicated is not available, hence the general answer.

Learn more about worksheets at:
https://brainly.com/question/23501096

#SPJ4

(4, a) and (2, 5) are two points from a direct variation. What is a? Use the step-by-step process you just learned to solve this problem. Step 1: Set up the correct type of variation equation. y =

Answers

The value of a for point (4,a) in the direct variation is 10.

What is a direct variation?

The direct variation in mathematics is given as the equation relationship between the two numbers, where one is a constant multiple.

In the given problem, the variation equation is given as:

[tex]y=kx[/tex]

Where k is a constant.

The value of k can be derived from point (2,5):

[tex]5=k2\\\\k=\dfrac{5}{2}\\\\ k=2.5[/tex]

Substituting the values of k for the point (4,a):

[tex]a=2.5\;\times\;4\\a=10[/tex]

The value of a for point (4,a) in the direct variation is 10.

Learn more about direct variation, here:

https://brainly.com/question/14254277

#SPJ1

A while loop is frequently used to ______________ data.

A. validate
B. correct
C. inspect
D. interpret

Answers

i believe the answer to your question is A but i’m not 100% sure

Becky is preparing a document for her environmental studies project. She wants to check her document for spelling and grammar errors. Which function key command should she use?

A.

F1

B.

F2

C.

F5

D.

F7

E.

F12

Answers

According to what I know, I think it is F7.

PLEASE HELP HURRY
For each of the following, identify the best tool for the conversation: e-mail, phone, or in person.

Your boss asked to see a draft of your next report.

You want to discuss an opportunity for promotion with a career mentor.

A coworker wants to share a meeting agenda with you.

A meeting is taking place in five minutes and you are not sure where the meeting is
being held.

Answers

A conversation is the exchange of ideas between two or more people. An email can be used to draft reports, and to share the meeting agenda, while an in-person discussion must be done for the promotion-related talks.

What is an e-mail?

E-mail is an electronic mail that involves sending and receiving textual information from one computer system to another. It is used for professional and academic use like sending a work report or sharing meetings and work-related queries.

To discuss an opportunity related to promotion, the person should have an in-person talk with a career mentor. Also to know the details about the meeting that will take place soon one must make a phone call instead of using email.

Therefore, the best tool for the conversation are:

E-mailIn-personE-mailPhone

Learn more about the conversation here:

https://brainly.com/question/10875655

#SPJ1

6.1.4 Guess a Number 2.0

Answers

There are different ways of coding, An example of 6.1.4 Guess a Number 2.0 is given in the space below

What is the 6.1.4 Guess a Number 2.0 about?

speed(0)

pensize(10)

def green_check():

penup()

setposition(0,0)

color("green")

backward(25)

right(45)

pendown()

forward(35)

left(90)

forward(75)

def higher():

penup()

setposition(0,0)

pendown()

left(90)

forward(100)

right(145)

forward(50)

right(180)

forward(50)

left(105)

forward(50)

def lower():

penup()

setposition(0,0)

pendown()

right(90)

forward(100)

left(145)

forward(50)

left(180)

forward(50)

right(105)

forward(50)

user_number = int(input("Guess a number 1 through 10? "))

secret_number = 6

if user_number < secret_number:

higher()

user_number = int(input("Guess a number 1 through 10? "))

elif user_number == secret_number:

green_check()

else:

lower()

user_number = int(input("Guess a number 1 through 10? "))

Learn more about code from

https://brainly.com/question/4514135

#SPJ1

Other Questions
What was Magellans original motive for undertaking his voyage?He hoped to sail all the way around the world.He hoped to sail all the way around the world. He hoped to reach the Indies by sailing east around Africa.He hoped to find a route to the Indies by sailing west around America.He hoped to discover America and start a new colony. The figure below shows a rectangular lawn. 23ft 14ft (a) Use the calculator to find the perimeter and area of the lawn. Make sure to include the correct units. Perimeter: Area: (b) The lawn will be mowed. Which measure would be used in finding how long it will take? Perimeter Area (c) The lawn will be surrounded by a rope. Which measure would be used in finding how much rope to buy? Perimeter Area Answer the questions using the drop-down menus. How many men were involved in the break-in at the Watergate complex? Why did they break into the Watergate building? What organization did the men belong to? What did the men receive for carrying out the break-in? The median of 5, 13, 20, 13, 8, 7, 9, 15 Waldo gets stopped by the police. What happens to the carbon that cannot be absorbed by Earths sinks? How is a change in the circumference of a circle related to the diameter of a circle Ancient Egypt amulets included.and where on the body were they placedthanks :) What differences did you notice between the way the writing support page taught this grammatical skill and the way we covered active and passive voice in class? What would be the correct calculation to determine pi from this circle?A. 2 + 4B. 4 - 2C. 2 4D. 12.56 4 Which literary device is used in the following quote? "The road in whichwe found ourselves as we turned round the corner from the retiredSaxe-Coburg Square presented as great a contrast to it as the front of apicture does to the back?" Which of the following statements most accurately describes theme?A text can have only one theme.B The theme is about what readers learn.C Theme is the subject of the story.D Theme should be stated in a sentence. Need help finding this answer please n thanks The colonial message that british troops were on their way to concord on april 18, 1775, was delivered by a paul revere. b samuel prescott. c william dawes. d samuel adams. A 35-mf capacitor is connected to an ac source with a frequency of 400 hz and a maximum emf of 20 v. The maximum current, in s. I. Units, is: Which tissue makes up the husk of coconut? Which one is the correct answer? Which conditions might contribute to an animal species becoming extinct? (1 point) A. rain shadows B. tundra C. climate change D. diversity? Please help no expiation needed just pick one A sample is determined and a poll conducted for that sample, but many respondents choose not to answer all the questions asked in the poll. This contributes to what type of error?. What is the value of y in this system of equation? -6x+2y=-18 -3x-2y=54