What is a type of destructive program?

Question 5 options:

Application


Database


Trojan


Warfare


Flight

Answers

Answer 1

Hey there!

Sorry for the late response but C. Trojan is the correct answer. As a software development intern (Well, kinda. I'm 13), Trojans are some of the most destructive viruses ever. Trojans, or Trojan malware as its known can be anything from a file to a simple popup. It is a type of malware that disguises itself as a innocent, simple object. Sure, it might be giving you a code to redeem for Robux (Trust me, a lot of people fall for it), but people won't be crying that the code doesn't exist, they will be crying that everything on their computer has been taken over and swiped. That one little pop-up that one might see is a very deadly-but-silent computer killer (as I like to call it)

I'm always open to questions or comments!

God Bless!

Brainlyiest?

-X8lue83rryX


Related Questions

To gain experience of using and combing different sorting algorithms: election sort, insertion sort, merge sort, and quick sort. Project Description It is a written assignment, you just need to submit a text file in txt, or docx or pfd format and don't have to submit your testing codes. For the following array x [10] = { 45, 20, 50, 30, 80, 10, 60, 70, 40, 90} show the contents of x after the function call split Pos = split(x, 0, 9) is executed, and give the value of the array index splitPos (the first is the pivot). ( 10 points) Modify quicksort() to incorporate this modification: In quicksort, we do not splitting sublists further when they have fewer than LOWER_BOUND elements for some constant LOWER_BOUND. When execution of the quicksort algorithm terminates, simply sort the whole list using insertion sort. (15 points) Use the similar diagram as

Answers

Answer:

Motivation? The search problem.

Sorting algorithms: insertion sort, shellsort, heapsort, mergesort, quicksort, bubblesort

At the very least, "general purpose" sorting algorithms require O(n log n) comparisons

Explanation:

You are the systems administrator for a scientific research company that employs over 100 scientists who write and run Linux programs to analyze their work. All of these programs are stored in each scientist's home directory on the Linux system. One scientist has left the company, and you are instructed to retrieve any work from that scientist's home directory. When you enter the home directory for that user, you notice that there are very few files and only two directories (one named Projects and one named Lab). List the commands that you would use to navigate through this user's home directory and view filenames and file types. If there are any text files, what commands could you use to view their contents?

Answers

Final answer:

To navigate and explore a scientist's home directory in Linux, use the 'ls' command to list files, 'cd' to change directories, 'file' to determine file types, and commands like 'cat', 'less', 'head', 'tail', and 'grep' to view contents of text files.

Explanation:

To navigate through a user's home directory and view filenames and file types, while also having the capability to view the contents of any text files, a series of commands would be used in the Linux command line.

First, to list the contents of the home directory, you could use the ls command:

ls - To simply list all the files and directories.ls -l - To list the files and directories with details such as permissions, owner, size, and modification date.ls -a - To list all files, including hidden files (those that start with a dot).

To navigate into one of the directories (Projects or Lab), you would use the cd (change directory) command:

cd Projects - To enter the Projects directory.cd Lab - To enter the Lab directory.cd .. - To go back up to the parent directory.

To view the file type of a specific file, the file command could be utilized:

file <filename> - This command will tell you the type of file for the specified filename.

If any text files are discovered, the following commands can be used to view their contents:

cat <filename> - To display the content of the file on the screen.less <filename> - To view the content of a file one page at a time.head <filename> - To view the first few lines of a file.tail <filename> - To view the last few lines of a file.grep 'search_pattern' <filename> - To search inside the file for lines containing the search pattern.

someone who protects valuable online information, like phone numbers and passwords would be considered​

Answers

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?

Place the information on other slides that already exist.
Click in the Task pane.
Click on the New Slide icon.
Select the New Slide option from the Format menu.

Answers

Answer:

Click on the New Slide icon.

Explanation:

You need to create a new slide to add more information to your presentation, you cannot just squeeze all bits of remaining info onto previous slides.  First, the information might not be related, second it will overload the slides, not good for presentations.

The "New Slide" option wouldn't be in the "Format" menu, since that menu is for the formatting of the text and slides, not to add a new one.

Answer:

I think you add a new slide

Explanation:

So you can add more of the information you have

Have a great day!!!

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 30, 40}, then newScores = {20, 30, 40, 10}. Note: These activities may test code with different test values. This activity will perform two tests, the first with a 4-element array (newScores = {10, 20, 30, 40}), the second with a 1-element array (newScores = {199}). See "How to Use zyBooks". . Also note: If the submitted code tries to access an invalid array element, such as newScores[9] for a 4-element array, the test may generate strange results. Or the test may crash and report "Program end never reached", in which case the system doesn't print the test case that caused the reported message.

Answers

Final answer:

To shift oldScores left and copy the first element to the end, a loop can be written that iterates through the array starting from the second element, copying each to the previous index in a new array, and then placing the first element of the old array at the end of the new array.

Explanation:

To set newScores to oldScores shifted once left, with the first element copied to the end, you can write a loop such as a for loop in many programming languages. Here is an example in a pseudo-code format:

Let newScores be an empty array of the same size as oldScores.For each index, i, from 1 to the last index of oldScores:Set newScores[i - 1] to oldScores[i].Set newScores at the last index to oldScores[0].

This loop goes through each element of the array, starting from the second element (index 1), and assigns it to the previous index in the new array. Then the first element (index 0) of the old array is placed at the end of the new array to complete the single left shift.

Old fashion Morse code uses a series of dots and dashes to stand for letters, digits and punctuation marks. This program will allow a user the option to: 1. Enter a series of words (including blanks) and encoded them into their equivalent Morse code. 2. Enter a series of encoded Morse code and translate it into its equivalent letters, digits and punctuation marks. 3. Allow the user to keep executing the application multiple times (i.e. encode than decode or vice versa). Some sort of loop depending on when the user chooses to quit? (User may want to simply encode then decode then return to decoding. Part of your grade is to allow a workable interface from the user’s standpoint) 4. Quit the program. Morse Code is: "A" .- "N" -. "1" .---- "B" -... "O" --- "2" ..--- "C" -.-. "P" .--. "3" ...-- "D" -.. "Q"

Answers

Answer:

public class TestMorseConverter

{

   public static void main (String[] args)

   {

       MorseConverter converter = new MorseConverter();

       String englishPhrase = "To be or not to be that is the question";

       String morsePhrase = converter.englishToMorse(englishPhrase);

       System.out.println(morsePhrase);

       System.out.println(converter.morseToEnglish(morsePhrase));

       

   }

}

Explanation:

Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An attacker could potentially perform a downgrade attack. B. The connection is vulnerable to resource exhaustion. C. The integrity of the data could be at risk. D. The VPN concentrator could revert to L2TP. E. The IPSec payload reverted to 16-bit sequence numbers.

Answers

The correct options are:

A. An attacker could potentially perform a downgrade attack.

- When both strong and weak ciphers are configured on a VPN concentrator, an attacker could potentially force the connection to use weaker encryption by performing a downgrade attack. This increases the vulnerability of the connection.

C. The integrity of the data could be at risk.

- Weak ciphers may not provide sufficient protection for the integrity of the data being transmitted. Thus, when weak ciphers are configured alongside strong ciphers, the integrity of the data could indeed be at risk.

Which of the following is the best way to locate books and research from all over the United States and abroad?
A. Bing
B. Google
C. WorldCat
D. Refseek

Answers

WorldCat is the world’s largest library catalog. If you are looking to find books and research from all over the world, WorldCat would be the perfect website to use.

An international database of libraries and their catalogs that have registered with WorldCat. Great way to locate books and research from all over the United States and abroad.

The best way to locate books and research from all over the United States and abroad C. WorldCat

What is the purpose of WorldCat?

WorldCat is the world's largest network of library content and services. WorldCat libraries are dedicated to providing access to their resources on the Web, where most people start their search for information.

What is the purpose of WorldCat?

WorldCat is the world's largest network of library content and services. WorldCat libraries are dedicated to providing access to their resources on the Web, where most people start their search for information.

To learn more about WorldCat, refer

https://brainly.com/question/12682668

#SPJ2

How do you access the dark web

Answers

Answer:

look up dark web links

Explanation:

Answer:

Use Tor Browser, Make sure you have a untraceable router

download Grams And it takes to the Ground deep in the dark web

i tried and yes it works but must have good PC a lot of hackers

but there's a lot of other ways but I use this it works for me

A computer professional who has access to sensitive information shares this information with a third party. Which professional code of conduct did the person violate?A.
diligence in service
B.
company discipline norms
C.
confidentiality of information
D.
conflict of interest

Answers

The correct answer is c

The correct answer is C. Confidentiality of information

Explanation:

The Confidentiality of information is a principle of ethical and professional code that implies sensitive information of clients or others is protected appropriately and therefore is not shared with a third party or used for other purposes. In the case presented, the computer professional violated this principle because he had sensitive information and he shared it with a third party which means the information of other people was not protected appropriately which is against ethics because this information can be used maliciously.

Which team behavioral characteristic helps team members to freely express ideas and foster approachability?
A.
communication
B.
spirit of appreciation
C.
leadership
D.
respect

Answers

Answer: Communication

Explanation:

Ryan has a table containing student details. The students have enrolled for various courses including Sociology, Anthropology, Philosophy, and so on. Ryan currently wants to view only the details of students who have enrolled for Sociology. What action should Ryan perform?
Ryan should apply a
on the Courses column and view all courses that show Sociology.

Answers

Answer:

Ryan should apply a FILTER on the Courses column and view all courses that show Sociology.

Explanation:

A filter on the column will present him with a selection of the different values present in that column (in this case the course subjects) and allow him to pick one (or more) items from that list.

The spreadsheet will then display only the rows containing that value (or those values) in that column.

Ryan will then be able to see which students enrolled in Sociology and only those.

Player casts 'Assassinate' on 'Acolyte of pain'. Acolyte's owner will:

A. Draw no cards.

B. Draw 1 card.

C. Draw 2 cards.

D. Draw 3 cards.


Answers

The answer is B, draw 1 card.

Answer:

A. Draw no cards.

Explanation:

Eventhough Acolyte is a card that whenever takes damage makes its owner draw a card from the deck, when its killed by the opponent player when using assasinate the owner of Acolyte should not draw any card from the deck.

g Your task is to provide the three classes: AppendUndoModel1, AppendUndoView1, and AppendUndoController1 so that they implement the corresponding interfaces. The easiest way to get started is to copy the DemoModel1.java, DemoView1.java, and DemoController1.java files from the DemoGUI3 project into the src directory of the AppendUndoGUI project, rename them appropriately, and then edit them until all compiler errors are gone and their behavior matches the corresponding interfaces. Note: if you cannot get everything compiling and/or working it is OK. You will get a chance to complete this task in lab with help from the instructors. However, you should try to get as far as you can on your own.

Answers

Answer:

Hey Bro! Have any of your question got deleted? Every time I post a question my questions get deleted. Do you know why?

Explanation:

JavaScript is the same thing as Java?

Answers

Not really, because Java is an OOP programming language and JavaScript is an OOP scripting language.

Hope I helped!

~Mshcmindy

Key differences between Java and JavaScript: Java is an OOP programming language while Java Script is an OOP scripting language. Java creates applications that run in a virtual machine or browser while JavaScript code is run on a browser only. Java code needs to be compiled while JavaScript code are all in text.

Computer networks make setting appointments easier by _____.

telephoning attendees
sending out invitations
reassigning tasks to enable attendance
sending electronic reminders
providing a common calendar

Answers

Probably providing a common calendar

Answer:

The correct answer is: "Computer networks make setting appointments easier by sending electronic reminders".

Explanation:

This is a feature almost all computer networks have, and if not there are still applications and plugins for that. These networks schedule, organize and set appointments and others according to the calendar, weeks, days, time, and working plan. Their reminders depend on the ones previously chosen, such as by email notifications, system's alarm, networks' events, mobiles' agenda, among others.

Jim has downloaded, installed, and is running too many programs simultaneously. At what pace will his computer be performing?
Jim's computer's pace will become
.

Answers

Answer:

Jim's computer will be performing at a slow pace

Explanation:

When you have too many programs open in the background, they eat up your cpu and core memory, causing your PC to lag. Jim's computer is likely to experience lag if he's running a bunch of programs at the same time.

For the following number, identify the numbering system used:

1 1101

Then explain what other numbering system a programmer might want to use and why

Answers

Answer:

Binary (base 2)

Explanation:

Another numbering system might be the hexadecimal system (base 16), for ease of representing long binary numbers, since it's easy to convert from hex to binary.

For instance, the 16 digit binary number 1111 0000 1011 1010 can be simply expressed as a 4 digit hexadecimal number F0BA, by doing the following quick math:

1111 (base 2) = 15 (base 10) = F (base 16)

0000 (base 2) = 0 (base 10) = 0 (base 16)

1011 (base 2) = 11 (base 10) = B (base 16)

1010 (base 2) = 10 (base 10) = A (base 16)

People usually append 0x at the front to indicate hex format, eg 0xFOBA.

Other Questions
Hugger Polls contends that an agent conducts a mean of 53 in-depth home surveys every week. A streamlined survey form has been introduced, and Hugger wants to evaluate its effectiveness. The number of in-depth surveys conducted during a week by a random sample of 15 agents are: 53 57 50 55 58 54 60 52 59 62 60 60 51 59 56 Picture Click here for the Excel Data File At the .05 level of significance, can we conclude that the mean number of interviews conducted by the agents is more than 53 per week? (Round your answer to 3 decimal places.) Reject H0 : 53 when the test statistic is . Compute the value of the test statistic. (Round your answer to 3 decimal places.) Value of the test statistic What is your decision regarding H0? Reject Do not reject Estimate the p-value. The p-value is . PLEASE HELP! The perimeter of a rectangle is 54 cm. Its length is 6 cm. What is its width?The formula perimeter of a rectangle= 2l+2w 14. Why was lapan allowed to maintain its armed forces? A and b are two similar 2D shapes. The area of shape awhich is 12cm is 200cm squared. Calculate the area of shape b which is 15cm 1. Mis hermanos ____ conducir, pero yo no ____. conocen, conozco saben, s conoce, sabe saben, conozco 2. ____ ustedes dnde est el estadio? No, no lo ____. Conocen, conocemos sabemos, conoce Saben, sabemos Conocen, sabemos 3. ____ a Lady Gaga? Bueno, ____ quin es, pero no la ____. Conoces, sabemos, s Conoces, s, conozco Sabes, conoce, sabe Conozco, sabemos, s 4. Mi profesora ____ Cuba y tambin ____ bailar salsa. sabe, s sabe, sabe conoce, sabe conoce, sabemos what is the solution to the system of linear equations? 2x+4y=20 and 3x+2y=26 These test tubes contain solutions of various colors, since they have been mixed with broth from red cabbage. The approximate pH values are noted.How would you best describe the red or pink solutions labeled 2-4? How would you best describe the purple to blue solution labeled 7? How would you best describe the yellow-green solution labeled 11? Can someone help me on this Plssss! Asap and show your work so it will understand. Thanks Match the air masses with their corresponding characteristics.continental tropicalmaritime tropicalcontinental polarmaritime polarcontinental arcticcold and dry =cold and moist =warm and moist =hot and dry =very cold and dry =eserved = Certain species of fish are unsafe to consume in high quantities because these fish A. ingest other fish that are poisonous to humans. B. have high levels of metals in them from cancer-causing pesticides. C. are endangered species. D. contain vitamins that aren't water-soluble and can cause toxicity.Please don't guess, try to give the correct answer In Physics lab, Ellen has been given the task of constructing a simple motor. She must find common household items at home and bring them to class the following day. Her list of items include:9 volt battery and leads, copper wire rotor, platform to hold the rotor, a magnet, and a wood baseShe sets up her motor in physics lab the next day and finds that it works well. Which statement below explains the flow of energy through Ellen's motor?A)battery-->electrical current-->copper wire rotor -->magnet--> mechanical energyB)battery--> magnet--> electrical current--> copper wire rotor--> mechanical energyC)magnet--> mechanical energy--> copper wire rotor--> battery--> electrical currentD)magnet--> copper wire rotor--> mechanical energy--> battery--> electrical current who is the last to stab Caesar? why does shakephere have this character stab Caesar last? what is the value of a21? Can anyone help me with this problem?3a=9a^2-30 Suppose you had d dollars in your bank account. You spent $12 but have at least $51 left. How much money did you have initially? Write and solve an inequality that represents this situation. What will be the cell potential for a cuzn galvanic cell with [zn2+]=0.1 m and the [cu2+]=0.01 m? view available hint(s)? The product of -11.4 and zero is?A. positiveB.zeroC.negative Which army from Vietnam war use guerrilla warfare tactics effectively A geometric sequence {an} is defined by the function f(1) = a1 = 6 and f(n) = an = (1.2)*f(n - 1) for n 2. Find f(38).A)273.6B)326.26C)5103.3735D)6124.0482 Can someone help please