cadenmccardle6672 cadenmccardle6672
  • 29-01-2020
  • Computers and Technology
contestada

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as ________

Respuesta :

redshift33
redshift33 redshift33
  • 29-01-2020

Answer:

Malware

Explanation:

malware is used to disrupt computer operation, gather personal info, and or gain access to private computer systems.

Answer Link

Otras preguntas

Mee: 5324611502 Pa: here​
“It is a man’s eccentric glory that he has not, generally speaking, any objection to being dead, but has a very serious objection to being undignified”
To solve the following equation for k using the quadratic formula, what value would you substitute for b? 3k2 = 4k + 7
can someone please help with this!!
Solve the equation 1/6(x-5) = 1/2(x+6)
1/7+2/5 answer in simplest way
In the 1992 presidential election, Alaska's 40 election districts averaged 2199 votes per district for President Clinton. The standard deviation was 588. (There
A 23 g bullet traveling at 230 m/s penetrates a 2.0 kg block of wood and emerges cleanly at 170 m/s. If the block is stationary on a surface with a coefficient
The ________ was made with small pieces of cut glass and tiles to form an image.
Based on his response to the Cyclops, what can be inferred about Odysseus?