mariamheny3766 mariamheny3766
  • 04-08-2017
  • Computers and Technology
contestada

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Respuesta :

kphung76127
kphung76127 kphung76127
  • 04-08-2017
The best answer is A, viruses.
Answer Link

Otras preguntas

The midpoint of AB is M(3, 4). One endpoint is A(-3, -2). Find the coordinates of the other endpoint B.
Where is has numbers can you help me put the right answer? Alicia: Miguel, ¿te gusta escuchar 1. los sábados? Miguel: Sí, pero me gusta más practicar 2. Teresa
PLEASE ANSWER THIS 30 POINTS
Can you change 4x−3y=12 into slope-intercept form?
the value of x if N is between M and P, MP=60, MN=6x-7, and NP=2x+3
I NEED ANSWER PLZ Given sets: D = {5, 6, 7, 8, 9, 10}, E = {1, 3, 5, 7, 9, 11}, F = {3, 6, 9, 12} What is D ∩ E?null set{1, 3, 5, 6, 7, 8, 9, 10, 11}{5, 7, 9}{9
As a new state, Georgia faced the challenge of never having had
what is the zero of the linear function?
Pls Answer if you know the right Answer According to the author, Pat Summitt learned important lessons about how to face difficult circumstances from her time s
Can someone slove this n and check 2(n +5) = -2​