![katlynnschmolke](/avatars/33196.jpg)
katlynnschmolke
10.01.2020 •
Computers and Technology
When several computers connected to the internet have been set up to forward spam and sometimes viruses to other computers on the internet, what is responsible?
spyware
worms
viruses
botnets
Solved
Show answers
More tips
- F Food and Cooking How to properly cook shrimp: tips from professionals...
- C Computers and Internet How to Choose a Laptop: Expert Guide and Tips...
- C Computers and Internet How to Choose a Monitor?...
- H Horoscopes, Magic, Divination Where Did Tarot Cards Come From?...
- S Style and Beauty How to Make Your Lips Fuller? Ideas and Tips for Beautiful Lips...
- C Computers and Internet How to Learn to Type Fast?...
- A Art and Culture Who Said The Less We Love a Woman, the More She Likes Us ?...
- F Family and Home How to Get Rid of Your Neighbors?...
- S Society and Politics How Could Nobody Know About the Dead Mountaineers?...
Answers on questions: Computers and Technology
- S Spanish Cuenta los siguientes objetos o personas que aparecen en la pintura¿cuantos son?...
- E English A fellow student has just finished a presentation on downloading music from the internet illegally. Which would be an appropriate question for you to ask the presenter...
- H Health An injury to the spinal cord can result in . A. ParalysisB. FunctionC. PostureD. Stimulus...
- M Mathematics A car travels 30\frac{1}{5} miles in \frac{2}{3} of an hour. What is the average speed, in miles per hour, of the car?...
- E English Why students should keep school environment clean...
Ответ:
Option D: Botnet
is the correct answer.
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, Botnets are responsible.Explanation:
A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.
All other listed options spread malicious data by some other means.
I hope it will help you!
Ответ:
Bdhdhhfhdhdhdhdhdhddhd