What term is used for a computer that belongs to a group of networked computers, all working mindlessly to serve the person who installed the program on the computers?

Answers

Answer 1
Answer:

Answer:

Zombie.

Explanation:

A zombie is a computer that is connected to the internet or a network but has been infiltrated by a Trojan horse, computer virus or hacker. This activity is not noticed by the owner or user of the computer.

These zombies usually launch DoS (Denial of Service) attacks and mostly spread email spam. They can be used also to get vital information about an organization or government agencies.

Up-to-date security measures must be installed and carefully considered to prevent these attacks.


Related Questions

According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______. A. reason effectively B. solve problems C. communicate clearly D. use systems thinking
Which domain of an IT infrastructure primarily includes the processes and procedures that end users use to remotely access an organization's IT infrastructure and data?
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the DHCP discover message differentiate this message from the DHCP request message? 4. What is the value of the Transaction-ID in each of the first four (Discover/Offer/Request/ACK) DHCP messages? What are the values of the Transaction-ID in the second set (Request/ACK) set of DHCP messages? What is the purpose of the Transaction-ID field?
PowerPoint displays many themes that are varied and appealing and give you an excellent start at designing a presentation. However, you have a specific topic and design concept and could use some assistance in starting to develop the presentation. You ____.
WRITE IN YOUR OWN WORDS:What is a possible sign that your computer has been hijacked by Botware?

A database program helps to ____________.a. Organize, send, and retrieve e-mails quickly
b. Deliver elegant presentations to a large audience easily
c. Create professional documents with an intuitive WYSIWYG interface
d. Organize, store, and retrieve large amounts of information easily

Answers

With this presented question and taking into consideration the options that are together with it as well, the most probable and the most likely answer for this would be D. Organize, store, and retrieve large amounts of information easily.

Database Management System or is widely known as database would be working just like the answer stated in this solution. Though some databases are specialized into doing much more than what is intended for it in the first place, generally speaking, all database can organize, can store, and can retrieve large amounts of information easily.

On edge the answer is A. Word Processing Program

When Dale made the decision to sell his stock in copper, he was using areport generated by his decision support information system. How can Dale
be sure that his report gives him relevant information?
O
A. Dale needs to configure the information system to produce
specific types of data that are relevant to his business needs.
O
B. Dale cannot do anything to ensure he gets the right information.
O
C. Dale should just ignore any irrelevant information that the system
produces
O
D. Dale should reset his system every morning to ensure he gets
relevant information.​

Answers

Answer: A. Dale needs to configure the information system to produce specific types of data that are relevant to his business

Answer:

Dale needs to configure the information system to produce

specific types of data that are relevant to his business needs.

Explanation:

To customize the mini toolbar, color schemes and enable the Live Preview feature you would use the _______________ option

Answers

Space bar option to do that

You manage a single domain named widgets. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You would like to define a granular password policy for these users. Which tool should you use

Answers

Answer:

The answer is "ADSI Edit".

Explanation:

Active Directory Service Interfaces would be a series of COM modules, that were used by various service providers to access the functions of directory services. It uses offers a single clear collection of active directory frameworks to control system resources in a computing environment.

It implies an AD editor of low concentrations that allows you to view, modify or remove objects and attributes. Far as utility and possible danger were concerned, ADSI Edit informs the machine registry which registration.

Why would an administrator lower an RF signal on a wireless access point?Increase QoS
Lower interference
Lower the signal to keep it in the building
Make it harder for guests to access the network

Answers

1. Increase QoS

Explanation:

The radio bands with lower frequency have relatively large wavelengths that are not as affected by objects such as building, trees, weather events or other features in the troposphere as the higher frequency radiation. General rule for radiation is that the lower the frequency, i.e. the longer the wavelength, the further a signal can penetrate through solid objects or liquids. Hence, when the frequency is lowered on a wireless access point, the signals can travel farther and smoother. Thus, increasing the quality of service.

Shelly and Donna are discussing System Restore. Shelly says when the System Restore program creates and saves a copy of your computer's configuration, this copy is called the restore copy. Donna says it's called the restore point. Who is correct?

Answers

Donna says correct. In a System Restore, the representation of a stored state of the system files in your computer is called restore point. It is use to restore the computer’s system files to an earlier point of time. The user may manually create the restore point, rollback to a restore point, or change the system restore configuration.