mariamheny3766 mariamheny3766
  • 04-08-2017
  • Computers and Technology
contestada

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Respuesta :

kphung76127
kphung76127 kphung76127
  • 04-08-2017
The best answer is A, viruses.
Answer Link

Otras preguntas

Write a Rhetorical Analysis evaluating the effectiveness of an author's argument. A Rhetorical Analysis is an examination of how an author persuades readers of
What are the two decisions that you can make from performing a hypothesis test? what are the two decisions that you can make from performing a hypothesis test?
What is the wavelength of a photon that has an energy of j a. nm b. nm c. nm d. nm e. nm
HELPPPPPPP PLEASEEE Which of the following sentences uses the participial phrase correctly? A. Chandler got trapped under the heavy log and yelled for help. B
Secured loans are loans that required which can be used to pay off the loan in the event Of?
What should you do if every dilution of your sample results in a plate that is too few to count (tftc)?
Lithium metal reacts with nitrogen gas to form lithium nitride. identify the balanced reaction that describes this process
James marcia defines _____ as a period of identity development during which an individual is exploring alternatives. crisis calling conscientiousness commitment
Training is a key element for an organization pursuing a commitment based hr strategy. True or false?.
03.11 segment exam one part2 what is the time period for Gold in the sky by Alan E. Nourse I need 3 specific, details, or quotes from the passage, the passage