What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources

Answers

Answer 1

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.


Related Questions

Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document . Why does this happen

Answers

Consider that there are many different components of one file such as a song rather than a word document of typed words. Research the components of why this song takes up space on a computer.

Write a list comprehension statement to generate a list of all pairs of odd posi

Answers

Answer:

Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])

Explanation:

Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;

In other to ensure that ;

Lower digit is written first ; (a < b) ;

Only odd numbers are considered,

a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.

Both a and b are declared as a tuple in other to obtain a pair of odd values.

please help

Write a method that takes 5 ints as parameters and returns the average value of the 5 ints as a double.

This method must be named average() and it must have 5 int parameters. This method must return a double.

Calling average(1, 5, 7, 4, 10) would return 5.4.

Answers

Answer:

Answered below

Explanation:

This solution is written in Kotlin programming language.

fun average (a: Int, b: Int, c: Int, d: Int, e: Int) : Double {

#variable to hold the addition of all parameters

var sum = a + b + c + d + e

#variable to hold the average of sum

var avg = sum / 5

return avg

}

#call the function to see how it works.

# this operation is done in the fun main()

var test: Double = average ( 5, 4, 7 , 3, 9)

print (test)

Describe the action of the indexOf and substring methods. Explain how these methods can be used to divide an existing string into two parts. Why is it necessary to add 1 to the position of the space when copying the remainder of the string

Answers

Answer:

The indexOf is a string method used to get the index of a character in a string. It can be used with the slice, substr, or subString methods to divide a string into two or more parts.

var words = "hello John Snow";

var A = words.slice(0, words.indexOf("John"));

var B = words.slice(words.indexOf("John") + 1, words.length());

One (1) is added to the space of avoid repeating a character in both new strings.

Explanation:

The indexOf method is a built-in method in Javascript used to get the index of a character or word in a string variable. The return integer number can be used in a method like a slice() to divide the string and them to other string variables.

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that takes in the number of feet and the number of inches that the object has. Then it transforms the number of feet into inches and adds the remaining inches to a variable called total_inches. Finally, it prints the total number of inches to the screen.

public static void print_total_inches (int num_feet, int num_inches) {

               int feet_to_inches = num_feet * 12;

               

               int total_inches = feet_to_inches + num_inches;

               

               System.out.println(total_inches);

               }

Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access and use information.

Answers

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

Using social media, such as text messages and status updates, has helped

users become more

o

A. wordy

O B. succinct

O C. formal

O D. slow

Answers

Answer:

succinct

Explanation:

it means to be brief or short, as most people who text or use social media like twitter have a limited character limit and want to make the most of it.

What is the output of the following program

#include

int toronto (int x)

{

int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }

a. 0
b. 1
c. 2
d. -1
e. none of these

Answers

Answer:

The output is 1

Explanation:

Analysing the flow of program (We start from the main method)

The main begins here

int main (void) {

This line declares a as integer and also initializes it to 2

int a = 2;

This line passes 2 to the function names toronto and also prints the result of the function

printf ("%d", toronto (a));

return (0); }

The toronto function begins here.

Note that the function receives 2 as its argument and this is saved in variable x

int toronto (int x) {

This declares w as integer

int w;

If x is 0, w equals 1

if (x == 0) w = 1;

If otherwise

else

This reduces x by 1 and performs a recursion

w = toronto (x-1);

return (w);

}

Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.

And when x = 0; w = 1

This returns w (i.e. 1) back to the main function where 1 is printed as the output

return (w);

discuss how sentiment analysis works using big data?

Answers

Answer:

sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.

Which of the following terms best describes the product development life cycle process?
descriptive
iterative
Static
evaluative

Answers

Answer:

D

Explanation:

Evaluative

Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correct answer. But when Adam tests the program, it always outputs that it took the user one guess, even when it takes many guesses. What error did Adam most likely make, and how should it be fixed? The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A while loop happens until a certain condition is met. How do you know when to use each one? Give specific examples in your answer. What are some programs that you have used that have condition-controlled loops and count-controlled loops? Why is it important that if, elif, and else statements appear in the proper order? What are some situations where you might find it useful to use the “!” symbol in a program?

Answers

Answer:

There are two ways in which programs ... count-controlled loops; condition-controlled loops ... Sometimes it is necessary for steps to iterate a specific number of times. ... A count-controlled loop is used when the number of iterations to occur is ... the variable 'count' is used to keep track of how many times the algorithm

Explanation:

Answer:

Adam most likely forgot to add a while loop to the guessing code or didn’t add it properly, meaning that instead of letting him guess multiple times it just continues the code, all he needs to do is add a while loop to fix the line of code.  

Explanation:

hope this helps

A corporate or government network that uses Internet tools, such as Web browsers, and
Internet protocols best defines

Answers

Answer: Intranet

Explanation:

The options include:

A. extranet.

B) social network.

C) intranet.

D) e-market.

A corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols is referred to as intranet.

Social networks are social media sites that are used by people which allows them to stay connected with one another.

E-market is a form of marketing whereby goods and services are promoted or advertised through the use of the internet.

Therefore, the answer to he above question is intranet.

If you can answer theses ill give u a brainliest (i think thats how u spell it) but only if u get it right u will get one NOT A SCAM!!

Question: In which logical operator at least one condition has to be true?

O or

O None of the above

O not

O and

Question: In which logical operator both conditions must be true?

O and

O or

O not

O None of the above

Answers

Answer:

or / and

Explanation:

i took the quiz at unitek college

Answer:

1. or

2. and

Explanation:

You already know about lists. What missing function will return the index of 7 in the list? >>> myList = [12, 5, 7, 3, 25] >>> myList. (7)

Answers

Answer:

The index function

Explanation:

Required

What function is needed to complete the program

To return the index of an item in a list, we make use of the index function.

In this case, the complete program will be:

myList = [12, 5, 7, 3, 25]

print(myList.index(7))

At the end of program compilation and execution, the index of 7 (which is 2) will be returned/printed.

Answer:

index

Explanation:

A counter is ?

A. used only outside of the loop

B. none of the above

C. a variable used in a loop to count the number of times an action is performed

D. A person with a pen and paper

Answers

Answer: In digital logic and computing, a counter is a device which stores (and sometimes displays) the number of times a particular event or process has occurred, often in relationship to a clock. The most common type is a sequential digital logic circuit with an input line called the clock and multiple output lines.

Select all the correct answers. Which statement will print the output 10 + 20=30

a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);

Answers

Answer:

a

Explanation:

b will print out a boolean, true, i think

c gives an error?? i think

d seems weird

e is weird too

anyway, b,c,d,e all have bad syntax

Answer:

a

Explanation:

You need to save a document and be absolutely sure that none of the formatting is lost. Which of these document formats would be best?

1) DOC

2) HTML

3) PDF

Answers

In my opinion the one that would be the best is 3. PDF but it could also be 1. DOC

I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image

Answers

Answer:

you can move it you can shrink it and you can put a text box on it

Text refers to:

A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.

Answers

Answer:

B

Explanation:

How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file.

Answers

Answer:

- To get the items of a dictionary and print them as a string, use the items() method to unpack the keys and values in a for and print or write them into a file.

for key, value in mydict.items():

   print(f"{key}, {value}")

- To convert string from user input into dictionary;

   mystring = input().split(" ")  #assuming the words are separated by a space.

   from word in mystring:

       mydict[word] = mydict.get(word, 0) + 1

This would use the words in the string as the keys of the dictionary and the count of each word as the respective values.

Explanation:

A dictionary is a data structure in python used to store data in key-value pairs. The items are enclosed in curly braces and can be accessed with the key in dot or bracket notation.

Dictionaries in Python are used to represent data items in pairs; i.e. key and values

(a) Format items as strings in an input file

To do this we make use of the file manipulation.

Assume the dictionary name is given as: myDict

See attachment for the complete solution

Read more about Python dictionary at:

https://brainly.com/question/14353514

WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES

Answers

Answer:

lectronic Health Record (EHR) Software. ...

Medical database software. ...

Medical research software. ...

Medical diagnosis software. ...

Medical imaging software. ...

E-prescribing software. ...

Telemedicine software. ...

Appointment scheduling (booking) software.

how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address

Answers

Answer:

The answer is "14".

Explanation:

Let the IP address [tex]= 196.45.204.0[/tex]

When it borrowed 4 bits

[tex]\therefore\\\\ subnet = 28[/tex]

[tex]IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000[/tex]

If the borrowed bits are left out then:

The Number of useable host addresses:

[tex]= {(2^4) - 2} \\\\ = 16-2\\\\ =14[/tex]

Vanessa is a set designer. She is working on a period film set in Egypt. She has selected several items for a scene in a palace. She visits a library and a museum in Cairo to check the authenticity of the items. What responsibility is Vanessa undertaking?

Answers

Answer:

the responsibility of cultural and historical accuracy checking

Explanation:

Vanessa seems to be undertaking the responsibility of cultural and historical accuracy checking. By visiting the library and museum, Vanessa is researching historical data in order to make sure that the items that she has selected match the same type of items that Individuals living in Ancient Egypt times would use as well. This provides both historical and cultural accuracy to the film by representing The citizens of Ancient Egypt as they were in that time.

C - researching

PLATO

According to the video, what types of education are useful for Database Administrators? Check all that apply.
high school degrees
college degrees
certification
communication workshops
Done
Intro

Answers

Answer:

b.college degrees

c.certification

Explanation:

The type of education useful for Database Administrators are college degrees and certifications. The correct options are b and c.

What are Database Administrators?

A database management system typically supports the platforms' administration, development, and use. A Relation Database Management System (RDBMS) is a category of Database Management System (DBMS) that includes a structure (row-based table) that connects data pieces as well as operations that are intended to ensure the data's accuracy, security, consistency, and integrity.

They are capable of doing this since they are familiar with database administration tools and technologies. Currently, one of the most sought-after jobs in America is database administration.

Hospitals, banks, and insurance corporations are a few examples. To put it another way, database administrators are in charge of creating, maintaining, and protecting your databases.

Therefore, the correct option is b. college degrees, and c. certification.

To learn more about Database Administrators, refer to the link:

https://brainly.com/question/13261952

#SPJ6

Which of these method of ArrayList class is used to obtain present size of an object/

a. size()
b. length()
c. index()
d. capacity()

Answers

Answer:

The method of ArrayList class which is used to obtain the present size of an object is:

a. size()

Explanation:

In ArrayList, the size() method provides the number of objects available in the collection, array, or list.  In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them.  An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.

Which conditions make using an array a better choice than a list? Select 3 options.

1. when you will do a great deal of arithmetic calculations

2. when you have a very large quantities of numeric data values

3. when all your data are string

4. when your list would contain a mixture of numbers and string values

5. when efficiency is of great importance

Answers

Answer:

When efficiency is of great importance

When you will do a great deal of arithmetic calculations

When you have a very large quantities of numeric data values

Explanation:

Did it one edge

1. when you will do a lot of arithmetic calculations

2. when you have very large quantities of numeric data values

5. when efficiency is of great importance

Thus, options A, B, and E are correct.

What is an array?

A data structure called an array consists of a compendium of values, each of which is identifiable by a memory location or key. In different languages, additional data structures that capture an aggregate of things, like lists as well as strings, may overlay array types.

Just using an array is a preferable option when you'll be performing a lot of math operations, when you're dealing with a lot of numerical data values, and when performance is crucial. A grouping of comparable types of data is called an array.

Therefore, option A, D, and E is the correct option.

Learn more about array, here:

https://brainly.com/question/13107940

#SPJ2

What does a wireless LAN (WLAN) act as to a wired network?

a. Gateway
b. Bridge
c. Switch
d. Router

Answers

Answer:

The answer is option A "Gateway"

Explanation:

A wireless LAN (WLAN) connects at least two computers or devices using some wireless distribution technique (normally spread-spectrum or OFDM radio), and as a rule gives a connection through a gateway/modem to the more extensive Web. This gives clients the portability to move around through a local coverage and still be connected with the network.

Wireless LANs have gotten famous in the home because of simplicity of establishment, the expanding ubiquity of PC and hand-held PCs, and commonality, due the accessibility of (frequently free) wireless network on schools and in open organizations.

A WLAN, or wireless LAN, is a network that permits gadgets to connect and communicate wirelessly. Dissimilar to a traditional wired LAN, in which gadgets communicate over Ethernet links, devices on a WLAN connects by means of Wi-Fi. They can speak with different gadgets on the network a similar way they would on a wired network.

The essential contrast is the way the information is communicated. In a LAN, information is communicated over actual links or cables in a progression of Ethernet packets. In a WLAN, bundles are communicated over the air.

True or false: In relational databases, each individual space within a row or column contains exactly one value.

Answers

Answer:

True.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

Hence, in relational databases, each individual space within a row or column contains exactly one value.

how do is excel interpret data?

Answers

Explanation:

Once a spreadsheet has a data set stored within its cells, you can process the data. Excel cells can contain functions, formulas and references to other cells that allow you to glean insights in existing data sets, for example by performing calculations on them.

Which of these expressions is used to check whether number is equal to value?
num?value
num=value
num-value
num==value

Answers

i think it's the second one

Answer:

d:num==value

Explanation:

Other Questions
You spend $75 on a meal including tax and want to leave a tip that is 20% of the $75. What is the total cost, with the tip? The cost of your meal, with the tip, is $(answer) What is the slope of a line parallel to the line 2x + 3y = 5? The number of individual networking address required for the internet is Which theme do the two passages have in common?The political party system has historically posed significant difficulties for democratic societies.Giving too much authority to any person or group of people can lead to corruption and the abuse of power.The broad powers granted to Congress make the legislative branch the most powerful branch of the U.S. government.Shifting the balance of power between the branches of the U.S. government, which requires a Constitutional amendment, is overly complicated. Need help. brainliy to the first person that answers is right telling why 1. Energy transfer is inefficient between trophic levels because A. Molecules are fully digested from each trophic level. B. Dead organisms and waste are recycled throughout the trophic levels. C. Organisms within a trophic level are fully consumed. D. All organisms within a trophic level die.2. Primary productivity is defined asA. The rate that plants and other photosynthesis organisms produce organic compounds.B. The process where green plants and some other organisms convert light energy into chemical energy using carbon dioxide and water.C. The overall amount of energy captured by plants and other photosynthetic organisms by the chloroplast. D. The adjusted amount of energy in an ecosystem due to energy use by organisms for respiration. Thanks if you help, It's highly appreciated. :-) The economic ideology expressed in the passage, combined with the industrialization of the early 19th century, most influenced society in which of the following ways?The working class achieved new levels of social mobility.Wealth became increasingly accumulated by a small, elite class.The middle class began to erode as more people began to work in factories.Political equality increased as members of all social classes became wealthier. People tend to evaluate the quality of their lives relative to others around them. In a demonstration of this phenomenon, Frieswijk, Buunk, Steverink, and Slaets (2004) conducted inteviews with frail elderly people. In the interview, each person was compared with fictitious others who were worse off. After the interviews, the elderly people reported more satisfaction with their own lives. Following are hypothetical data similar to those obtained in the research study. The scores are measures on a life-satisfaction scale for a sample of n = 9 elderly people who completed the interview. Assume that the population average score on this scale is = 20. Are the data sufficient to conclude that the people in this sample are significantly more satisfied than others in the general population? Use a one-tailed test with = .05. The life-satisfaction scores for the sample are 18, 23, 24, 44, 19, 27, 23, 26, 25. A 52 gram sample of an unknown metal requires 714 Joules of energy to heat it from30.5C to 82C. What is the specific heat ofthis metal?Answer in units of J/g C. I WILL GIVE BRAINLYESTRead the article "Voyages of Discovery:"Centuries ago, countries sponsored explorers to set sail for parts unknown and return with tales of new lands. These explorations led the Europeans to discover North America. The ocean journey from England, France, or Spain to North America was 3,000 miles of unknown dangers, but it led to discoveries. Explorers made these treacherous voyages for three main reasons: religion, wealth, and competition. These voyages of discovery began in the eleventh century.Historical records indicate that Leif Eriksson, a Viking explorer, was the first man to reach North America around 1000. Leif is credited with landing along the coastline of present-day Newfoundland. A Viking settlement was established and occupied for several years before Eriksson left to return to his homeland. He died around 1020.Much later, Christopher Columbus left his homeland in 1492 to seek wealth in the form of trade items. The Italian explorer was destined for China but erred in direction and arrived on Watling's Island in the Bahamas. It was a long and dangerous journey. Upon arrival, Columbus dedicated the newly discovered land to the Spanish King and Queen of Aragon. Then, Columbus made three more voyages to North America in 1493, 1498, and 1502. To the very end, Christopher Columbus was adamant that he discovered a trade route to China. He denied ever being to North America.Credited with sailing around the southern tip of Florida, Spanish explorer Juan Ponce de Leon had several adventures in the New World. His journey around Florida occurred in 1513. At the time, he thought Florida was an island. When he returned to Florida in 1521, he was wounded by a poisoned arrow, which ultimately ended his life.Afterward, Hernando De Soto, a Spanish adventurer, left to explore present-day Florida in 1538. He and his men traveled thousands of miles through the South. They were the first Europeans recorded to have crossed the Mississippi River in 1541.Sir Walter Raleigh was a soldier, a writer, and a friend of the Queen of England. Around 1587, he sent English colonists to a region later called Virginia. The colony is believed to have been located in North Carolina. Since the people arrived together, their previous lifestyle and beliefs were transplanted to the New World.Finally, Rene Robert de La Salle was French. Historical data credits de La Salle as being the first explorer to traverse the Mississippi to its mouth at the Gulf of Mexico. He claimed the land that bordered the Mississippi River (about a third of present-day United States) for France on April 9, 1682. He built numerous forts along the route, but the settlers were often terrorized by the natives.These brave explorers from England, France, and Spain have left their legacy. As a result of their adventures, many people now enjoy North America's religious diversity, natural resources, and independence.What is the overall structure of this text?Cause and effectChronological orderCompare and contrastProblem and solution 9. Which statement is true regarding the distribution of population throughout the world? (1 point) A Three-fourths of the world population occupies half of the planet's surface because of the abundance of hospitable land. B Three-fourths of the world population occupies 5 percent of the planet's surface due to water and less hospitable land. C Three-fourths of the world population now occupies half of the planet's surface due to diminishing polar areas as a result of global warming. D Half of the world population occupies 5 percent of the planet's surface due to more advanced forms of transportation. A teenagers heart pumps an average of 7200 L of blood every 24 hours. What is the rate of change of volume of blood? Which excerpt from "The Most Dangerous Game" is an example of foreshadowing?"Can't see it," remarked Rainsford, trying to peer through the dank tropical night that was palpable as it pressed its thick warm blackness in upon the yacht.Who cares how a jaguar feels? The world is made up of two classes--the hunters and the huntees. Luckily, you and I are hunters.I hope the jaguar guns have come from Purdey's. We should have some good hunting up the Amazon.I've seen you pick off a moose moving in the brown fall bush at four hundred yards, but even you can't see four miles or so through a moonless Caribbean night." in 1-2 complete sentences define "opportunity cost " in your own words The product of a number -7 is 63. 4.02>4.1 TRUE OR FALSE I need help ASAP please Which sentence is best structured to present two ideas of equal importance?A. Since NASA was founded, it has sent more than 250 astronautsinto space.B. The mission of NASA is to explore outer space.C. Some people think that NASA should focus on exploring theuniverse, but others believe that building a colony on the moon isthe most important goal, even though it will be difficult.D. NASA is known for sending humans to the moon, but the famousspace program has also sent an unmanned spaceship to Mars. If anything is possible, is it possible for anything to be impossible? please help me with triangle angles. due today ! Matter of opinionIs lying a necessarily a bad thing? List its pros and cons from the perspective of a good liar