Why is it difficult to detect a Trojan horse?

Answers

Answer 1

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

Answer 2

Answer:

Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. ... The computer's antivirus and antimalware programs will be disabled and the necessary steps to remove malware will be inaccessible.

Explanation:

In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. ... One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users' devices to attack the routers on their wireless networks.


Related Questions

dont laugh . How do I get a bee out of my but?

Answers

Answer:

i'd get that checked out by a doctor asap!

Explanation:

please go to the doctor or tell your parents!

Answer:

I-

Explanation:

Just go to the doctor. And how did it get there in the first place? Also cant tell if this is a joke or not lol

what is part of computer

Answers

Answer:

CPU, GPU, SSD or HDD, Cooler for CPU, RAM, and power supply.


If i missed something please let me know

Answer:

The parts of a computer are listed below;

MonitorCPU (computer processing unit)KeyboardMouseSpeaker.

What are the problems with security when working on a Web Page?

Answers

Answer:

Hackers are sometimes able to exploit vulnerabilities in applications to insert malicious code.

Explanation:

Answer:

Depending if you have a virus already on your computer then your security risk on opening a new web page may be high

If not the security risk would be low

but to sum it up It really depends what your default search engine is

rn i use DuckDuckGo and i posted a Screen shot (if ur using chrome this extension can be added) and google (not saying its bad) but it has a risk for you security.

I really hope this helps

High Hopes^^

Barry-

help me please, thanks :)
will mark brainliest btw

Answers

benifits Ease of Access to Information. The World Wide Web, abbreviated as www has made the world a social village. Saves Time. Ease of Mobility. Better Communication Means. Cost Efficiency.  Innovation In Many Fields. Improved Banking Better Learning Techniques.

risks Theft or manipulation of sensitive or private information, such as financial or health records.

Virulent computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations.

Computer fraud.

Which is the best reason for why it is important to keep personal information private online?
to prevent becoming the target of a scam
to ensure strangers do not approach them
to prevent others from using it dishonestly
to stop people from following them online

Answers

Answer:

A. To prevent becoming the target of a scam

Explanation:

The more person information you put out on the internet, the easier it is for people to steal it and use it for malicious purposes.

Answer:

To prevent others from using it dishonestly.

Explanation:

Keeping private information to yourself is always a safe approach. Giving out your private information could result in false behavior on your account.

In what ways are Outlook notes useful for personal or professional use? Check all that apply.

Notes can be dragged and dropped onto your computer desktop.
Notes can be saved as an Outlook item in a Contact or Calendar Event.
Notes can send reminders for important tasks and events.
Notes are useful for saving hard-to-remember information.
Notes can be used for taking meeting notes.
Notes can save file attachments and pictures.

Answers

Answer:

a b d e on edge 2020.........

Notes can be dragged and dropped onto your computer desktop. Notes can be saved as an Outlook item in a Contact or Calendar Event. Notes are useful for saving hard-to-remember information. Notes can be used for taking meeting notes. The correct options are A, B, D, and E.

What are Outlook notes?

The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.

You can send and receive emails, manage your calendar, add and remove contacts, and keep track of projects with Outlook.

The counterpart of physical sticky notes in computer form is a note. Use notes to scribble down everything you would write on paper, including inquiries, ideas, reminders, and more. While working, one can leave notes open on the screen.

You can drag and drop notes onto the desktop of your computer. Notes may be saved in a Contact or Calendar Event as an Outlook item.

Hard-to-remember information can be saved in notes. You can utilise notes to record meeting minutes.

Thus, the correct options are A, B, D, and E.

For more details regarding Outlook, visit:

https://brainly.com/question/13040097

#SPJ2

Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for the fill-in-blank of this question is desktop.

Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application.  But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.

So a desktop wordprocessor would be easiest to use for writing your paper.

Answer:

It's "Laptop"

Explanation:

Which of the following is not a thing needed to make a network?
a)Network software b)Network devices c)Motherboard d)Cables

Answers

Answer:

d) cables is your answer

Answer:

Motherboard is not a thing needed to make network

Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?

fault-tolerance

file tolerance

fault-line

file protection

Answers

Answer:

the answer is fault tolerance

Explanation:

Answer:

fault-tolerance

Explanation:

On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.

I hope this helped!

Good luck <3

The purpose of the merge and center command is to _____.

Answers

The merge and centre command is one of the most common tools used in formatting tables in a word-processing software. In addition, its primary purpose is to "merge cells into one cell and center the text in that cell." in order for the spreadsheet in a report to become more presentable.

Why do you think they added the wait .5 seconds block?

Answers

Answer:

Satisfaction

Explanation:

People enjoy the sensation of the computer doing something and the feeling that the program is advanced.

What is a help desk
technician?
O An individual who troubleshoots and repairs smartphone hardware components
O An individual who manages and maintains network servers
O An individual who diagnoses and resolves users' technical hardware and software problems
An individual who manages and maintains a network infrastructure

Answers

Answer:

C: An individual who diagnoses and resolves users' technical hardware and software problems

List 2 benefits of printing in pla filament

Answers

Answer: Advantages of PLA include:
Low printing temperature: PLA has a relatively low printing temperature compared to other thermoplastics (e.g. for PLA an ideal printing temperature starts from around 180°C, while ABS this is around 250°C). ...
Ease of use: PLA is one of the easiest material filaments to 3D print with






Kinda gave more than 2 but hope it helped you ! ;)

Why is the len ( ) function useful when using a loop to iterate through a stack?
The len ( ) function will print the elements of the stack.
The len ( ) function will run with each iteration, printing the element number each time.
The len ( ) function will tell the program the number of elements in the stack.
The len ( ) function will remove the duplicate elements in the stack.

Answers

The len ( ) function will run with each iteration, printing the element number each time.

The len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.

What is len ( ) function?

The len ( ) function is the function which gives back the number of characters as a output in a given text string. The len function gives back the zero when the string is empty with no text in it.

Let suppose a word "HELLO" is written on the string. Then the len function count the characters of this word and  gives back the result as 5.

This function is helpful when using a loop to iterate through a stack as there it describes the number of elements in the stack.

Thus, the len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.

Learn more about the len ( ) function here;

https://brainly.com/question/17054161

#SPJ2

Which of the following is a way to keep you safe online? (select all that apply)

set up a spam folder
give out personal information to strangers
only open e-mails from people you know
keep anti-virus software up to date

Answers

Answer:

1). set up a spam folder

3).only open e-mails from people you know

4).keep anti-virus software up to date

Explanation:

IM DIFFERENT BREEED!

The options that are a way to keep you safe online are:

Set up a spam folder.Only open e-mails from people you know.Keep anti-virus software up to date.

What ways can keep you safe online?

When a person keep their personal information private and from online views, one can be able to keep themselves safe.

Conclusively, Note that a lot of  Hackers do make use of the profile of people on social media and as such, doing  the above things can help keep you safe.

Learn more about online from

https://brainly.com/question/2014724

#SPJ2

what is ICT gadget, examples,types,uses, functions, important​

Answers

Communication and information technologies include devices such as computers, which help people to communicate with others and access information.

What does ICT stand for?

This abbreviation refers to information and communication technologies, which is a very popular term nowadays.

What are some examples?Television.Computers.Smartphones.Tablets.Among others.

How are they classified?

They can be classified based on their invention date (older/newer), their purpose (education, entertainment, etc,) or how accesible they are.

What are they use for?Access information such as searching about astronomy on internet.Communicating with others such as videocalls or text messages.

Why are they important?

They help people stay informed and communicated. Moreover, they have shaped modern world.

Learn more about technologies in: https://brainly.com/question/9171028

What type of file is MyFile.exe?

Answers

The file type is excel

Answer: executable

Explanation:

What is a goal for a good programmer?

a. writing efficient code

b. force the computer to multitask

c. to increase the memory in a computer

d. name applications

Answers

Answer:

A. Writing efficient code.

Hope this helps!

Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists

Answers

Answer:

A. The correct answer is attendance at live performances.

Explanation:

took it on edge 2020

What is the definition of delimited text?

Answers

Answer:

A delimited text file is a method of representing a table of data in a text file using characters to indicate a structure of columns and rows. This is typically used to provide an import/export function for services, software and databases that represents data in a neutral format. The following are common types of delimited text file. Hope this helps!

Answer:

Characters are separated by commas or tabs.

Explanation:

I just did it on edg 2020

A second class lever needs less effort to lift a heavy load. Give reasons​

Answers

Explanation:

1. Using a lever makers it easier to move a load and so you use less effort.

2. Second class lever:- The load is between the fulcrum and the effort

These types of lever always acts as a force and magnifier and it's mechanical advantages is greater than one

The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process? The client sends a request to the DNS server. The DNS server translates the IP address back to the URL. The process starts over at the beginning. The web server sends the information back to the web browser.

Answers

Answer:

The web server sends the information back to the web browser.

Explanation:

The DNS look up is the process that happens when we type a URL into the browser gets converted into an IP address that's used to locate the website's servers. Then when this query reaches a final server, it is returned back to the computer with the data that we need.

So the final step in the DNS process is the web server sends the information back to the browser.

I hope this answer helps.

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?

On the Insert tab, click the Insert New command.
On the Insert tab, click the Add New command.
On the Home tab, click the New Slide command.
On the Home tab, click the Arrange command.

Answers

Answer:

C on edg

Explanation:

I just took the review

Answer:

On the Home tab, click the New Slide command

Explanation:

Complete the statement below using the correct term.

All digital devices use software programs to function. Software
create these programs.

Answers

Answer:

System software and Application software

Explanation:

System software Includes Operating System, Database Management Systems, and Software Utilities

Application software Includes performance of a particular application

this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and more.​

Answers

A computer is an electronic device that manipulates information, or "data." It has the ability to store, retrieve, and process data. You can use a computer to type documents, send email, and browse the internet. You can also use it to handle spreadsheets, accounting, database management, presentations, games, and more. A computer is an electronic machine that has the ability to receive data and process it into valuable information that it stores in different storage media, and is often able to exchange these results and information with other compatible devices. And the fastest computers today are able to perform hundreds of billions of mathematical and logical operations in a few seconds. It’s computer because the definition of a computer is A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.

The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to the temporary storage in your brain?

BIOS
PRM
RAM
ROM

Answers

Answer:

RAM

Explanation:

"RAM" refers to Random-Access Memory. Just like the human brain, this stores your computer files temporarily. It is considered to be a "volatile memory" which means that information can only be stored when there's power. So, when your computer shuts down, the information is lost. This is similar to the human brain, especially when it comes to learning. When a person learns new things, some of the information he read before may be forgotten.

_____ are pictures that you can click on to tell your computer what to do.

icons
menus
applications
FATs

Answers

Answer:icons

Explanation:The reason it is icons is because icons can become pictures

Answer:

Icons

Explanation:

can create pictures by grouping together.

1
Match the following document file types with the suitable descriptions.
Document file type
Description
(a) TXT file
• (i) It can be edited by Microsoft Word 2010.
(b) PDF file
(ii) It can be opened in OpenOffice.org Writer.
(c) DOCX file
• (iii) It can be shared on the Internet easily.
(d) Google document
(iv) It can be opened by most word processors.
(e) ODT file
. (v) Its content and layout cannot be edited by
an ordinary word
processor.​

Answers

Answer:

a-i b-II c-III d-iv e-v

Which type of memory resides within a computer's CPU?
_____ memory resides within a computer's CPU.
(not multiple choice)

Answers

Main memory.

Main memory resides within a computer's CPU.

Answer:

Internal

Explanation:

Other Questions
Read this short passage and answer the question below:Excerpt from Stuff MattersBy Mark MiodownikAt some point humans made the discovery that would end the Stone Age and open the door to a seemingly unlimited supply of the stuff. They discovered that a certain greenish rock, when put into a very hot fire and surrounded by red-hot embers, turns into a shiny piece of metal. This greenish rock was malachite, and the metal was, of course, copper. It must have been the most dazzling revelation. Suddenly the discoverers were surrounded not by dead inert rock but by mysterious stuff that had an inner life. They would have been capable of performing this transformation with only a few particular types of rock, such as malachite, because getting it to work reliably depends not just on identifying these rocks but also on carefully controlling the chemical conditions of the fire. But they must have suspected that those rocks that didnt work, that remained obstinately rock-like however hot the fire became, had hidden secrets. They were right. Its a process that works for many minerals, although it would be thousands of years before an understanding of the chemistry required (controlling the chemical reactions between the rock and the gases created in the fire) led to the next real breakthrough in smelting. In the meantime, from around 5000 BC, early metal smiths used trial and error to hone the process of the production of copper. The making of copper tools initiated a spectacular growth in human technology, being instrumental in the birth of other technologies, cities, and the first great civilizations. The pyramids of Egypt are an example of what became possible once there were plentiful copper tools. Each block of stone in each pyramid was extracted from amine and individually hand-carved using copper chisels. It is estimated that ten thousand tons of copper ore were mined throughout ancient Egypt to create the three hundred thousand chisels needed. It was an enormous achievement, without which the pyramids could not have been built, however many slaves were used, since it is not practical to carve rock without metal tools. It is all the more impressive given that copper is not the ideal material for cutting rock since it is not very hard. Sculpting a piece of limestone with a copper chisel quickly blunts the chisel. It is estimated that the copper chisels would have needed to be sharpened every few hammer blows in order for them to be useful.What is the authors main message? A) Copper was the first metal used by humans. B) Copper was a critical tool in building the pyramids. C) Humans were not able to effectively use copper at first. D) The discovery of copper was the beginning of civilizations. 12Which value of x makes this equation true? *- 4 (3 x) + 2x = 8 What is the length of a typical thesis statement?A. 1 or 2 paragraphs B. 3-5 sentences C. The entire introduction D. 1-2 sentences (Its either B or C) In your own words, define fascism and totalitarianism. How are they different? Which is a positive effect of the globalization of social media websites like Fill in the blank with the correct form of tre.Il _____espagnol.tesestsontsommes please help measuring ! Can someone give me the correct awnser im tired of it Completa6. El nio se el tobillo y lo tiene muy hinchado.7. Se___ la pierna y el cirujano ortopdico la tiene que poner en un yeso.8. Los socorristas pusieron a la vctima en una camilla y la llevaron al hospital en9. Jos necesita ayuda para andar. Anda conCompleta con el verbo indicado.10. Es importante que nosotros ejercicios. (hacer)11. Es necesario que ellos nos (acompaar)12. Es posible que ella (estar)13. Es probable que yo (ir)14. Es imposible que tu lo .(saber) (10 point)Why is the serpent on the Mexico flag and what does it have to do with the Aztec people? What are the colors on the Mexico flag and what does each color represent? tres temas secundarios del mito de Narciso. necesito ayuda por favor What is the Next three term of this sequence 1,-3,-7,-11Please help me dont answer this question i made it accidentally Before Odysseus sets foot back home, he has been gone a total of 10 years15 years20 years25 years please answer me im giving you 50 points !!! Plz help me complete this table HELLPPPP!!!! 12 POINTS 3. The metric system of measurement is based on the number 1 What are the two most common reasons for modifying the land in South and Southeast Asia?A.aquaculture and flood controlB.manufacturing and tradeC.agriculture and forestryD.mining and fishingPlease select the best answer from the choices providedABCD +Hele Oqt7nOo (Oettin