What type of malicious software masquerades as legitimate software to entice the user to run it?

Answers

Answer 1
Answer:

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.


Related Questions

Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the customer via email to let them know of the new ship date.A)NegativeB)Positive
Consider the following definition of a recursive method. public static int mystery(int[] list, int first, int last) { if (first == last) return list[first]; else return list[first] + mystery(list, first + 1, last); } Given the declaration int[] alpha = {1, 4, 5, 8, 9}; What is the output of the following statement? System.out.println(mystery(alpha, 0, 4)); a. 1 b. 18 c. 27 d. 32
Look at the following assignment statements:word1 = "skate"word2 = "board"What is the correct way to concatenate the strings?newWord = word1 / word2newWord = word1 + word2newWord = word1 * word2newWord = word1 = word2
Write an application that calculates and displays the amount of money a user would have if his/her money could be invested at 5% interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation and return the result to be displayed. Save the program as Interest.java
Write a method called allDigitsOdd that returns whether every digit of a positive integer is odd. Return true if the number consists entirely of odd digits (1, 3, 5, 7, 9) and false if any of its digits are even (0, 2, 4, 6, 8). For example, the call allDigitsOdd(135319) returns true but allDigitsOdd(9145293) returns false.

Assume that two computers are directly connected by a very short link with a bandwidth of 125 Mbps. One computer sends a packet of 1000 Bytes to the other computer. What’s the end-to-end delay (ignoring the propagation delay)?

Answers

Answer:

End to End Delay = 64 micro second

Explanation:

Given

Bandwidth = 125Mbps

A packet = 1000 bytes

Converting bandwidth from Mbps to bit/s

Bandwidth = 125* 10^6 bits/s

Bandwidth = 125,000,000 bit/s

End to End delay is calculated as

Length of Packet ÷ Bandwidth

Length of Packet = 1,000 byte --- convert to bits

Length of Packet = 1000 * 8

Length of Packet = 8,000 bits

So, End to End delay = 8,000/125,000,000

End to End Delay = 0.0000064 seconds --- convert to micro second

End to End Delay = 64 micro second

Given the following structure and variable definitions, struct customer { char lastName[ 15 ]; char firstName[ 15 ]; unsigned int customerNumber; struct { char phoneNumber[ 11 ]; char address[ 50 ]; char city[ 15 ]; char state[ 3 ]; char zipCode[ 6 ]; } personal; } customerRecord, *customerPtr; customerPtr = &customerRecord; write an expression that can be used to access the structure members in each of the following parts: a) Member lastName of structure customerRecord. b) Member lastName of the structure pointed to by customerPtr. c) Member firstName of structure customerRecord. d) Member firstName of the structure pointed to by customerPtr. e) Member customerNumber of structure customerRecord. f) Member customerNumber of the structure pointed to by customerPtr. g) Member phoneNumber of member personal of structure customerRecord. h) Member phoneNumber of member personal of the structure pointed to by customerPtr. i) Member address of member personal of structure customerRecord. j) Member address of member personal of the structure pointed to by customerPtr. k) Member city of member personal of structure customerRecord. l) Member city of member personal of the structure pointed to by customerPtr.

Answers

Answer:

see explaination

Explanation:

a)

customerRecord.lastName

b)

customerPtr->lastName or (*customerPtr).lastName

c)

customerRecord.firstName

d)

customerPtr->firstName or (*customerPtr).firstName

e)

customerRecord.customerNumber

f)

customerPtr->customerNumber or (*customerPtr).customerNumber

g)

customerRecord.personal.phoneNumber

h)

customerPtr->personal.phoneNumber or (*customerPtr).personal.phoneNumber

i)

customerRecord.personal.address

j)

customerPtr->personal.address or (*customerPtr).personal.address

k)

customerRecord.personal.city

l)

customerPtr->personal.city or (*customerPtr).personal.city

m)

customerRecord.personal.state

n)

customerPtr->personal.state or (*customerPtr).personal.state

o)

customerRecord.personal.zipCode

p)

customerPtr->personal.zipCode or (*customerPtr).personal.zipCode

/* Q1. (20 points)Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA'as two inputs and returns two independent sets of rows: (1) all suppliers in the input countries, and (2) products supplied by these suppliers. The returned suppliers should contain SupplierID, CompanyName, Phone, and Country. The returned products require their ProductID, ProductName, UnitPrice, SupplierID, and must sorted by SupplierID.You should include 'go' to indicate the end of script that creates the procedure and you must include a simple testing script to call your sp_Q1 using 'UK' and 'Canada' as its two inputs\.\**For your reference only: A sample solution shows this procedure can be created in11 to 13 lines of code. Depending on logic and implementation or coding style, yoursolution could be shorter or longer\.\*/

Answers

Answer:

See the program code at explaination

Explanation:

CREATE PROCEDURE sp_Q1

atcountry1 NVARCHAR(15),

atcountry2 NVARCHAR(15)

AS

BEGIN

BEGIN

SELECT SupplierID, CompanyName, Phone, Country FROM suppliers

where Country in (atcountry1,atcountry2)

SELECT ProductID, ProductName, UnitPrice, SupplierID FROM Products

where SupplierID in(

SELECT SupplierID FROM suppliers

where Country in (atcountry1,atcountry2)) ORDER BY SupplierID

END

END

GO

-- Testing script.

DECLARE atRC int

DECLARE atcountry1 nvarchar(15)

DECLARE atcountry2 nvarchar(15)

-- Set parameter values here.

set atcountry1='UK'

set atcountry2='Canada'

EXECUTE atRC = [dbo].[sp_Q1]

atcountry1

,atcountry2

GO

Note: please kindly replace all the "at" with the correct at symbol.

The editor doesn't support it on Brainly.

software that interprets commands from the keyboard and mouse is also known as the? A. desktop B. Operating system C. operating disk D. hard drive

Answers

Answer:

C

Explanation:

16. A 6-cylinder engine has a bore of 4 inches and a stroke of 3.5 inches. What's the total piston displacement?A. 260
B. 263.76
C. 253.76
D. 250

Answers

Answer:

b i just guessed

Explanation:

What suggestions do you have for preventing scope creep in projects?

Answers

Answer:

Scope creep is defined as the uncontrolled changes occur in the projects scope is known as scope creep. It basically occur when the project scope are not properly define and controlled.

Suggestions for preventing scope creep in projects are as follow:

  •   By using the online projects software and the software management help in prevent the scope creep in the projects.
  •   We should always focus on the projects requirements and must understand the main vision of the clients.
  •   There is no requirement of overdoing in projects rather keeping it simple and accurate according to the main requirements. otherwise, it may lead to scope creep.