mariamheny3766 mariamheny3766
  • 04-08-2017
  • Computers and Technology
contestada

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Respuesta :

kphung76127
kphung76127 kphung76127
  • 04-08-2017
The best answer is A, viruses.
Answer Link

Otras preguntas

find the hcf of 6 and 8 by prime factorization method pls help? ​
Which expression has a value 48? .A) (4 + 5): 32-9 +3.B) 4+ 5 • (32 - 9) + 3.C) 4+ 5.3?(-9+3) .D) 4+5•3²-9= 320 brainly points asap​
What is an Indo-Australian plate an dwhat does it look like?
A fair die is rolled twice. Let X denote the sum of the values. What is E[X|A] where A is the event that the first roll was a 6.
Which of the following geographic features did Lewis and Clark encounter on their trek?A. Native Americans B. Rocky Mountains C. Delaware River D. Pacific Ocean
I forgot to do homework and its due tomorrow Solve: -2 3/4 ÷ (-2.5)
Classify each polynomial expression by number of terms and by degree. Identify the leading coefficient. Polynomial Expression Term Name Degree Name Leading Coef
A spinner has 4 equal sections. after spinning the spinner 15 times, the results are recorded in a table. which of the given statements is true? a. the theoreti
What event directly contributed to congress passing the war powers act of 1973
Choose the correct ending for the verb: Ella viv____ en Arizona. A. e B. i C. as D. a