subject

Match each label to its description.
tiles:
1) worm

2) virus

3) trojan horse

answer choices:
a) acts as a legitimate program and infects your computer when you run it

b) is an independent program that propagates through the network to infect computers

c) attaches to a software program and infects your computer, destroying your files

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 16:30
Select the correct answer. larry finds it easy to run legacy programs and applications in a virtualized environment. how does the virtualization provider make this possible? a. combines workloads of several underutilized servers to fewer machines b. installs and runs different versions of an operating system on the same computing device c. moves virtual machines from one server to another server at a different location d. streamlines and automates management tasks
Answers: 1
question
Computers and Technology, 22.06.2019 09:30
Is a string of code written to hurt others by damaging or destroying
Answers: 1
question
Computers and Technology, 22.06.2019 20:00
What statement best describes operating systems? it’s possible for modern computers to function without operating systems. most operating systems are free or very inexpensive. operating systems are managed by the computer’s microprocessor (cpu). operating systems manage the computer’s random access memory (ram).
Answers: 1
question
Computers and Technology, 23.06.2019 12:00
Which of these is an example of an integrated presentation? a. a table created in powerpoint b. an image pasted into powerpoint c. a caption created in powerpoint d. an excel chart pasted into powerpoint
Answers: 1
You know the right answer?
Match each label to its description.
tiles:
1) worm

2) virus

3)...
Questions
question
Mathematics, 11.07.2019 03:50
question
Physics, 11.07.2019 03:50
question
Mathematics, 11.07.2019 03:50
question
Mathematics, 11.07.2019 03:50
Questions on the website: 13722367