subject

Which of the following describes a Trojan horse?
A. Trojan horses track a computer user's keystrokes and any
websites visited in order to recognize trends or obtain credit card
information,
B. Trojan horses reproduce and attack computer systems, like email,
and do not depend on the users forwarding email attachments.
O c. Trojan horses enter a secure space, while an infected file proceeds
to be downloaded and run.
D. Trojan horses reproduce and attack computer systems, like email,
when users forward ails as attachments.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:30
What do character formats do for your document's message? a.set the tone b.provide organization c.provide clarity d.set how texts align with documents
Answers: 2
question
Computers and Technology, 22.06.2019 17:00
Match the following. 1. show grouping of word processing tasks that can be performed quick access toolbar 2. shortcut location for commonly used elements scroll bars 3. organized commands used to modify documents ribbon 4. used to align and measure content in a word screen zoom bar 5. vertical and horizontal bars that are used to navigate through a document contextual tabs 6. displays the name of the document in use ruler 7. allows users to enlarge or shrink a visual of a word document title bar
Answers: 2
question
Computers and Technology, 22.06.2019 19:30
When using a public computer or network, you should always
Answers: 2
question
Computers and Technology, 23.06.2019 06:00
What machine listens for http requests to come in to a website’s domain? a. a router b. a browser c. a server d. a uniform resource locator
Answers: 1
You know the right answer?
Which of the following describes a Trojan horse?
A. Trojan horses track a computer user's keys...
Questions
question
Mathematics, 10.02.2020 05:15
question
Mathematics, 10.02.2020 05:16
question
History, 10.02.2020 05:16
question
Mathematics, 10.02.2020 05:16
Questions on the website: 13722363