tylyhn1060 tylyhn1060
  • 05-02-2020
  • Computers and Technology
contestada

A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. (Hint: one word)

Respuesta :

xinjiajin xinjiajin
  • 05-02-2020

Answer:

Worm

Explanation:

This is what a worm does! It exploits small security holes in networks and computers.

Answer Link

Otras preguntas

one goal of the marshall plan was to
Write an equation for the nth term of the arithmetic sequence
Unlike plants, fungi lack ____________________ and cannot carry out photosynthesis. a. cell walls c. mitochondria b. chloroplasts d. nuclei
When you drive a car around a curve that is not banked, what force provides the centripetal acceleration? HINT: Think about turning a curve on ice. If the curve
You are determining the mass of an object using a triple beam balance. When the pointer is lined up with the zero mark, the riders show values of 300 grams, 20
One of the factors of g2 – 32g + 256 is: A. g + 8 B. g – 8 C. g – 16 D. g + 16
How do you make glue from jack fruit sap?
A heated piece of metal cools according to the function c(x) = (.5)x − 10, where x is measured in hours. A device is added that aids in cooling according to the
Kevin is 3 times as old as Daniel. 4 years ago, Kevin was 5 times as old as Daniel. How old is kevin now?
The spiral shape of the Milky Way Galaxy CANNOT be seen from Earth because ____.