Ilcienne6835 Ilcienne6835
  • 24-03-2022
  • Computers and Technology
contestada

A ________ is a malicious piece of self-replicating code embedded within another program/computer called the host. (Hint: one word)

Respuesta :

jeas262010 jeas262010
  • 24-03-2022

Answer:

A self-contained program that spreads through a computer network by exploiting security holes is called a worm A program with a benign capability that conceals another, sinister purpose is called a trojan horse

Explanation:

Answer Link

Otras preguntas

Whom did the Persians fight at the Battle of Marathon in 490 B.C.?
The longest subdivision in geologic time is a(n) ____. a. epoch c. century b. period d. eon   Please select the best answer from the choices provided
If you divide a square into two congruent triangles what type of triangles are they
3) Find the area of JUST the wood portion of the frame. This is called a composite figure
Artificial and mimic in a sentence
What was the legal standing of an enslaved person under this code in 1806?.
Diana invested $3,000 in a savings account for three years. She earn $450 in interest over that time period. what interest rate did she earn?
Identify and describe the particle in each phase of matter and how they are different in each phase of matter
something that keeps goods from moving in or out
Compare and contrast the role of management, as reflected by management theory, in the 20thcentury organization with the role of management in the 21st century.