subject
Computers and Technology, 20.08.2019 21:20 wwall7

What do you call when a hacker users multiple guest computers to crack a password?
macro virus
trojan horse
worm
botnet

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 02:00
Arecipients list has been loaded into a document. which commands should be clicked in order to filter the list so that letters will not be printed for recipients who live in a certain state? mailings tab, start mail merge, select recipients, type new list, then insert only contacts from the desired states mailings tab, rules, select recipients, use existing list, then choose a recipients list that includes only contacts in certain states mailings tab, select recipients, use existing list, rules, fill in, then type in certain states mailings tab, rules, skip record select “state” under field name, then type in the state name under “equal to”
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
Brian wants to conduct an online search with a certain phrase. he intends to use the words books that belong to the 1800s in his search. how should he use the word that in his search?
Answers: 1
question
Computers and Technology, 24.06.2019 12:00
What is a sketch or blueprint of a web page that shows the structure (but not the detailed design) of basic page elements such as the logo, navigation, content, and footer?
Answers: 3
question
Computers and Technology, 24.06.2019 12:50
When is it most apprpriate for a development team to change the definition of done
Answers: 1
You know the right answer?
What do you call when a hacker users multiple guest computers to crack a password?
macro viru...
Questions
question
Computers and Technology, 01.06.2021 16:30
question
Mathematics, 01.06.2021 16:30
question
Mathematics, 01.06.2021 16:30
question
Mathematics, 01.06.2021 16:30
Questions on the website: 13722360