cadenmccardle6672 cadenmccardle6672
  • 29-01-2020
  • Computers and Technology
contestada

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as ________

Respuesta :

redshift33
redshift33 redshift33
  • 29-01-2020

Answer:

Malware

Explanation:

malware is used to disrupt computer operation, gather personal info, and or gain access to private computer systems.

Answer Link

Otras preguntas

Pointed teeth help tear apart food, and large, flat teeth are used to grind food. Based on this information, what types of teeth are characteristic of animals t
When constructing an inscribed square, how many lines will be drawn in the circle?
How does POWA protect citizens against human rights violation?
Tara would be considered an alcoholic because she continues to drink alcohol even though her doctor has warned her of the severe health damages it's causing.
Kedar is comparing the costs of phone plans. For phone plan A, the cost is $15.00 to connect and then $0.02 per minute. For phone plan B, the cost is $4.69 to c
A - It is not misleading B - The x-axis does not have a consistent scale . C - The axes are both labeled
If Charlie has a set-back, he has _____. 1.)just started an exercise program 2.)a wrist injury 3.)a normal occurrence 4.)poor training
A. true b. false: a one-dimensional array can only store elements of a single data type, but a two-dimensional array can hold data of two different data types
In 2011, women working full-time and year-round earned ___ percent of what their male counterparts earned.
Mikhail Gorbachev's policy of perestroika was an attempt to