1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:

Answers

Answer 1

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware


Related Questions

A switch is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. True False

Answers

Answer:

True

Explanation:

A network switch is also called switching hub or a bridging hub. It is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. It makes use of Mac addresses in the forwarding of the data link layer (layer 2) of the OSI model. Types include managed switches, unmanaged switches, smart switches but to mention a few.

1) Write a command line that recursively copy the directories and files inside /etc to your home directory. g

Answers

Answer:

cp -R /etc /home

Explanation:

The command statement above is a Linux command line statement used to copy the directories and subdirectories of the /etc folder.

The 'cp' command is used to conventionally copy files and folders but with the '-R' flag, the specified folder is copied recursively. To copy a folder to another recursively, use the syntax;

cp -R <source folder> <destination folder>

Write a loop to print all elements in hourly_temperature. Separate elements with a -> surrounded by spaces. Sample output for the given program: (must be in python)
90 -> 92 -> 94 -> 95
Note: There is a space after 95.
------------------------------------------------------------------------------------------------------------------------
hourly_temperature = [90, 92, 94, 95]
for temp in hourly_temperature:
for index,temp in enumerate(str(temp)):
if index != len(temp)-1:
print(temp,'->',end=' ')
else:
print(temp, end='')
print('') # print newline
------------------------------------------------------------------------------------------------------------------------
My expected out is:
90 -> 92 -> 94 -> 95
I keep getting:
90 -> 92 -> 94 -> 95 ->
NOTE: I can't edit the last line "print('') #print newline"

Answers

Answer:

Following are the code to this question:

hourly_temperature = [90, 92, 94, 95]#defining a list that holds values

c= 0#defining a variable c

for temp in hourly_temperature:#defining a for loop to count list values

   c+= 1#defining c variable to increment the value of c

   for index,temp1 in enumerate(str(temp)):#defining for loop for spacing the list value

       if index == len(str(temp))-1 and c!= len(hourly_temperature):#defining if block that checks the length of list

           print(temp1,'->',end=' ')#print value

       elif c == len(hourly_temperature) and index == len(str(temp)) - 1:#defining elif block that checks the length of list

           print(temp1, end=' ')#print value

       else:#defining else block

           print(temp1, end='')#print value

Output:

90 -> 92 -> 94 -> 95  

Explanation:

In the above-given code, a list "hourly_temperature" is declared, in which an integer variable c is declared, that holds an integer value that is equal to 0, and two for loop is declared, and in the first loop is used for count list value, and inside the for loop is uses enumerate method to assigns an index for each item and use the conditional statement to check each list value and provide space in each element value.

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g

Answers

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

Networks and the interconnectivity of media have affected our society in that:
A. information is hard to get and has not been democratized.
B. countries have shifted away from a global economy.
C. ideas and information are shared quickly and easily.
O
D. the quantity of media now loses out to quality.

Answers

Ideas and information are shared quickly and easily

Answer:

C. Ideas and information are shared quickly and easily

Explanation:

Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D. malicious and software Answer: ________

Answers

Answer:

D. Malicious and software

FELLING GENEROUS GIVING AWAY POINTS:)


Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)

Answers

Answer:

thanksssssssss

g 'write a function that takes as input a list and outs a new list containing all elements from the input

Answers

Answer:

def mylist(*args):

   return args

new_list = mylist(2,3,4,5)

Explanation:

The simple python code above defines a function called mylist that receives multiple length of element as a list and returns the list a new list. The "*args" allows the function to receive any number of item and converts them to a list that is returned in the next statement.

The can also be achieved by simply assigning a squared bracket enclosed list to the variable or with the list() constructor.

Suppose that you have the following declaration:
stack Type stack(50); double num; and the input is
25 64-3 6.25 36-4.5 86 14 -129
Write a C++ code that processes this input as follows: If the number is non-negative, it pushes the square root of the number onto the stack; otherwise it pushes the square of the number onto the stack. After processing these numbers write a C++ code that outputs the elements of the stack.

Answers

Answer:

Explanation:

The code is written in C++:

#include <iostream>

#include <stack>

#include <math.h>

#include <iomanip>

using namespace std;

/*

* Supporting method to print contents of a stack.

*/

void print(stack<double> &s)

{

if(s.empty())

{

cout << endl;

return;

}

double x= s.top();

s.pop();

print(s);

s.push(x);

cout << x << " ";

}

int main(){

// Declaration of the stack variable

stack<double> stack;

//rray with input values

double inputs[] = {25,64,-3,6.25,36,-4.5,86,14,-12,9};

/*

* For each element in the input, if it is positive push the square root into stack

* otherwise push the square into the stack

*/

for(int i=0;i<10;i++){

if(inputs[i]>=0){

stack.push(sqrt(inputs[i]));

}else{

stack.push(pow(inputs[i],2));

}

}

//Print thye content of the stack

print(stack);

}

OUTPUT:

5     8     9     2.5     6     20.25     9.27362     3.74166     144     3

-------------------------------------------------------------------------

Process exited after 0.01643 seconds with return value 0

Press any key to continue . . . -

what is one issue when organizing around hierarchical functions

Answers

Answer:

The one issue that arises when organizing around hierarchical functions is the dilution of information caused by the absence of direct communication with the overall boss.

Explanation:

This problem is more pronounced when it takes an organization a longer time before initiating hierarchical functions.  Employees who have grown used to communicating directly with their bosses will now be distanced from them because direct reports to the overall bosses are no longer permitted.  Instead, each functional head is expected to coordinate their group information, have it thoroughly filtered before allowing the overall boss to access it.  One advantage is that functional hierarchies eliminate information overflow.  Unfortunately, some bosses do not feel comfortable, at first, when their organizations commence hierarchical organization of business functions.

what is meant by resources of computer

Answers

This question is not specific enough. However, a computer helps you listen to music, read articles and even novels, draw using online platforms, play games, etc.

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

what does "route print" do?

Answers

Answer:Route is a Windows command that displays and updates the network routing table. These activities will show you how to use the route command to display the local routing table.

Explanation:

pls help will give brainlest​

Answers

Answer:

C

Explanation:

Answer:using a louder voice

Source:trust me bro

Which feature is being used when connecting a device to the network using an electrical outlet?

Answers

Answer:

In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.

Write a second ConvertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches.

Answers

Answer:

Answered in C++

double ConvertToInches(double numFeet, double numInches){

   return numFeet*12 + numInches;

}

Explanation:

A foot is equivalent to 12 inches. So, the function converts feet to inches by multiplying the number of feet by 12.

The question is answered in C++

This line defines the method with two parameters

double ConvertToInches(double numFeet, double numInches){

This line converts the input parameters to inches and returns the number of inches

   return numFeet*12 + numInches;

}

To convert 9 feet and 12 inches to inches, the main method of the program can be:

int main(){

   cout<<ConvertToInches(9,12);

   return 0;

}

This above will return 120 because: 9 * 12 + 12 = 120 inches

Question #3
Multiple Choice
Which statement is true?
O A collection is a type of deque.
O A list is a type of deque.
O A deque is a type of list.
O Adeque is a type of collection.

Answers

A deque is a type of list

Answer:

D. A deque i a type of collection

Explanation:

I do computer science too ;3

A backup can be installed that costs​ $100. What is the minimum allowable reliability for the backup that would make installing it​ worthwhile? The minimum allowable reliabilit​ = nothing​%

Answers

Answer:

0.95

Explanation:

Reliability is a assurance that a machine would have an efficiency of one or close to one.

The minimum allowable reliability R;

(1 - R) x 2000 = 100

Make R the subject of the formula;

R = 1 - (100/ 2000)

R = 1 - 0.05

= 0.95

To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is processed

Answers

Answer:

The stored procedures in DBMS can be executed with;

EXEC procedure_name

It can also be executed with single or multiple arguments with

EXEC procedure_name (use the at tag here)Address= data1, (use the at tag here)Address= data2;

It returns a status value of the queried table.

Explanation:

A stored procedure is a subroutine used in SQL servers to perform a task on a table in a database or the database itself. The syntax for creating a stored procedure is;

CREATE PROCEDURE procedure_name

And then, other statements can be written to be executed when the procedure is called.

There are many different LAN technologies (Wifi, Ethernet, etc) that can be incompatible with each other in terms of how they exchange data. How is it possible then, that any source host can still send information to any destination host when connected in an internet? Explain the two important components of this process.

Answers

Answer:

Explanation:

The two most important parts of this process are simply sending and receiving the data. When a network sends data, the system breaks the data into smaller pieces called Packets. The system then checks if the network that the packets are being sent to exists, if so the packets are sent to that network. When the receiving network's router receives these packets it reconstructs all of the packets received into the final data in the format that the final LAN system can read and sends it to the appropriate device.

1. It is acceptable to use a jack that has been
A) O Dropped
B) O Cracked
C) Distorted
D) None of the above

Answers

D. None of the above

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.

please help add header file
/**
* TODO add header file
*/
public static boolean comp(int[][] b, int z, Random rand) {
int x = findWinningMove(b, z);
if(x != -1) {
dropToken(x, b, z);
return true;
}
x = findWinningMove(b, (z + 1) % 2);
if(x != -1) {
dropToken(x, b, z);
return false;
}
do {
x = rand.nextInt(BOARD_WIDTH);
} while(b[BOARD_HEIGHT - 1][x] != -1);
dropToken(x, b, z);
return false;
}

Answers

Answer:

jhgfycgxbhyjuufdxxcgbhjkml;,,,,,,,,,,,,,dfxcg,m .u9cgfbv nmkojihuygfc bvnjmkouhytfgvhbjfjfhngouuhjfcjbhbgfbjghbhjigjkijfbjfjigfijgfg

Explanation:

which two pieces of information must be provided when saving a file for the first time in wordpad​

Answers

The name and the saving location.

A .cache is made up of _____ , each of which stores a block along with a tag and possibly a valid/dirty bit

Answers

Answer:

Blocks

Explanation:

A .cache is made up of blocks, each of which stores a block along with a tag and possibly a valid/dirty bit.

Basically, each blocks that makes up the cache stores additional block and sometimes a bit.

A pre-design document you can use to create a new project quickly

Answers

Answer:

13) B - Landscape and Portrait

14) C - Template

Explanation:

The two print options are known as landscape and portrait and a template is a pre-designed document.

Learning Target: Students will work on final project.
You have leamed about video game industry and acquired basic skills to make basic
video games in this class so far. It is time to update your resume and cover letter.
Re-visit your assignments from 9/28-9/29 in this class. You can find that at your
submission in google classroom for this class for the dates mentioned. Type your
resume and cover letter using google docs or MS word professionally. First do
research to find a job opening in a real company. Craft your resume and cover letter
as if you are applying for the job listed. List game projects, coding skills etc. that
could benefit you in finding his job.
1. Check-in/Exit Ticket
2. Resume and Cover Letter

Answers

Answer:

I don't get this question

In Python, programmers use square brackets and an index range to slice multiple characters from a string.


True

False

Answers

(True) jgjgjgbfbfbfbdvdvdvdv

Answer:

True

Explanation:

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Answers

Explanation:

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.

A strategy for concealing critical information as well as ensuring its secure communication everything in non-hidden storage is steganography.

Advantage:

Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.

Disadvantage:

This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.

Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.

Advantage:

One such approach is superior to steganography throughout the level of protection.

Disadvantage:

Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.

Thus the approach above is correct.

Learn more about steganography here:

https://brainly.com/question/15187715

Other Questions
Helppppppppppppp please PLEASE HELP ME IM TIMED pls answer soon thx 5 The result of photosynthesis as glucose and oxygen A reactants B products C gas exchange D chlorophyll Paraphrase the subject matter of Psalms 16 At the beginning of the year San weighs 57 pounds during the year he loses 4 pound and then grain 9 pound how much does he weigh now A coin collection consists of dimes and nickels. If there are a total of 500 coins valuedat $39. how many dimes are there? Two years ago, Jose bought $750 worth of stock in a cell phone company. Since then the value of his stock has been DECREASING at an average rate of 5 1/4 % per year. How much is the stock worth now? does an object in motion stay in motion HELP PLSDetermine which is True Select all that apply Match each influence to the correct civilization. created cities for the dead, with artistic sarcophagi and elaborate tombs formed independent city-states led by kings painted the walls of their palaces with scenes of nature and religious rituals created one of the first written languages, Linear A, made up of 90 symbols held rituals in sacred caves with dancing, music, and prayers used an alphabet of 22 consonants, which later influenced the Latin alphabet Which of the statements below is true about the function y=20?A) The only value in the range is 20.B) The only value in the domain is 20.C) The only value in both the range and domain is 20. 14 (2 + 5) what the answer to this? Look at this painting by Claude Lorrain. Explain how this painting exemplifies the Grand Manner style. pls answer soon thanks! 3 Select the correct answer from the drop-down menu. Choose the best way to complete the description using sensory details. The sun was beginning to go downbeat down to warm my face was high in the sky as I continued climbing up the rocky mountain. When we meet Riley, most of the time Joy is in charge of her thoughts and personality. Which emotion(s) do you feel most often During the taking of its physical inventory on December 31, Barry's Bike Shop incorrectly counted its inventory as $222,138.00 instead of the correct amount of $184,409.00. The effect on the balance sheet and income statement would be:______.a. assets overstated by $52,094.00; retained earnings understated by $52,094.00; and net income statement understated by $52,094.00.b. assets overstated by $223,182.00; retained earnings understated by $171,088.00; and no effect on the income statement.c. assets, retained earnings, and net income all overstated by $52,094.00.d. assets and retained earnings overstated by $171,088.00; and net income understated by $223,182.00. find 3 consecutive numbers with the product 10626 How much power is used if a force of 35 newtons is used to push a box a distance of 10 meters in 5 seconds?w=350j