subject
Computers and Technology, 20.08.2019 21:20 wwall7

What do you call when a hacker users multiple guest computers to crack a password?
macro virus
trojan horse
worm
botnet

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 20:20, jazzy4211
Sometimes writers elaborate on the truth when recalling past events so they can enhance their narrative essay with more interesting descriptions. do you feel that published writers should or should not embellish real life events just to make their stories more interesting?
Answers: 2
image
Computers and Technology, 24.06.2019 05:30, MegRasmussen31
Hey i really need some solving this problem: 1. encrypt this binary string into cipher text: 110000. include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x n mod (m) = y & 2. decrypt this cipher text into a binary string: 106 you.
Answers: 2
image
Computers and Technology, 24.06.2019 08:00, ineemorehelp
Arah has entered data about football players from team a and team b in a worksheet. she enters names of players from team a with details about each player in different columns of the worksheet. similarly, she enters details of all the players from team b. which option will her view the data for team a and team b in two separate sections after printing? a. page break view b. freeze pane view c. split screen view d. full screen view e. zoom out view
Answers: 1
image
Computers and Technology, 24.06.2019 09:40, anyar
Healthy study habits are best described as
Answers: 1
You know the right answer?
What do you call when a hacker users multiple guest computers to crack a password?
macro viru...

Questions in other subjects:

Konu
Arts, 19.11.2020 14:00
Konu
Mathematics, 19.11.2020 14:00
Konu
Chemistry, 19.11.2020 14:00
Konu
Arts, 19.11.2020 14:00