Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A) a trojan B) phishing C) Use a surge protector. d) none of these

Answers

Answer 1
Answer:

Answer:

A Trojan

Explanation:

Emma has downloaded a Trojan. A Trojan, also referred to as Trojan horse is a type of malware that may look like it is legitimate, but once installed in your computer, it can cause a great havoc by taking control of your computer. It is usually designed to cause damage to a system, or to steal information, or inflict harm to your network or computer.

Answer 2
Answer:

Based on the scenario described, it is most likely that Emma has downloaded a malware onto her computer called as Trojan. Therefore, the correct option is A.

A Trojan is a type of malware that poses as a trustworthy program or file in order to trick people into downloading and installing it. Once installed, it can perform a number of nefarious tasks including stealing confidential data such as passwords and credit card details. Trojan horse is another name for Trojan. Trojans are so called because they hide their true nature like the famous Trojan Horse.

Therefore, the correct option is A.

Learn more about Trojan, here:

brainly.com/question/9171237

#SPJ6


Related Questions

What was the first practical implementation of rpc called?
Which of the following data structures can erase from its beginning or its end in O(1) time?
Which of the following statements accurately represents how independent musicians use the Internet? A) Independent musicians primarily use the Internet for personal communication. B) Independent musicians use the Internet solely for selling physical copies of their music. C) Independent musicians extensively use the Internet to distribute their music, connect with fans, and promote their work. D) Independent musicians avoid the Internet as it is not relevant to their careers.
You have been doing a lot of web surfing lately as part of your research for your course and along the way you have noticed a growing number of active server pages. You have a good head for technical details and ask your friend Laura to enlighten you about some of the finer points of ASP technology. Which of the following does Laura tell you is NOT a component of the active server page? a. the generated code component that executes on the web server b. the HTML component that is interpreted and executed by a web browser c. the database engine that generates the form d. All of the above are components of the active server page.
Carly will be going to college in 3 years. She anticipates that she will need $12,000 to pay for the first year. She currently has $2,900 in a savings account. Without including any interest earned, what is a reasonable estimate of the amount Carly needs to deposit into the savings account per month over the next 3 years to be able to pay for her first year of college?

The most commonly used method to connect to a WAN is through the telephone system. To do so, what piece of equipment would you require?

Answers


Modems create an analog signal that carries digital data on it,
and strip the digital data from an analog signal that they receive. 
That's what's needed to connect through the telephone system,
since the telephone system is still one big analog system.


Modem or router -  the device needs to be able to remove the data information from the audio information.

What is the speed of sound?

Answers

The answer is 340 m/s

The interactive process through which people learn the basic skills, values, beliefs, and behavior patterns of a society.

Answers

The answer is : Socialization

the interactive process through which people learn the basic skills, values, beliefs, and behavior patterns of a society is called Socialization
During socialization process, a person tend to understand what is acceptable in the society and which is not. During the process, a person could also discover various unique characteristics from each individual

Answer:

socialization

Explanation:

on edge

Which part of the software hierarchy is working behind the scenes allowing programs to perform tasks?Current machine instruction
Currently dispatched threads
Dispatchable threads
Waiting handlers

Answers

The right answer for the question that is being asked and shown above is that: "Currently dispatched threads." The  part of the software hierarchy is working behind the scenes allowing programs to perform tasks is that Currently dispatched threads

The option to send a publication in an e-mail is available in the _____ tab.File
Home
View
Review

Answers

Answer:

File

Explanation:

Linda is training to become a certified network design expert and consultant. While researching about the process of cellular radio transmissions, Linda learns that when a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. Which of the following is the next step in this process?a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office
b. The cell tower requests the cell phone user to stay in the current location until the recipient answers the call.
c. The cell tower routes the call to the sender's telephone via his or her mobile or conventional telephone service provider.
d. The cell tower combines service areas into overlapping bevel-shaped zones called frames.

Answers

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.