answersLogoWhite

0


Best Answer

q

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of malicious code is placed within a program to allow future access?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Which type of control is most commonly placed in the Detail section in Access?

Text Box


What is another name for a computer shortcut?

A shortcut is an icon placed on desktop you can click to get to the program. With this you don't have to go to start menu, then programs , then the program , to get there. Just hit icon on desktop. More on shortcuts: You can make shortcuts not only for programs but also for folders and any files which you frequently want to access. For creating a shortcut you can just select the file or folder, do a right click and then select send to desktop (create shortcut) option. Most of the installation programs automatically create shortcut on the desktop and some give you an option if you want to create a shortcut or not. - Neeraj Sharma


What is the meaning of constant variables?

Constant variables are variables that, once initialized, do not change in value. They are effectively the same as literal constants, except that you can use symbolic names to make it easier to understand the meaning of the program. For instance, in a trigonometry program, it is easier to use the identifier PI than it is to use the literal 3.1415926535897932. Also, if you have a constant that might be adjustable, such as a factor in an equation, naming it allows you to change its value by changing only one line of code, rather than seeking out all of the lines of code that refer to the factor. Constant variables are also candidates for being placed in read-only memory, potentially making the program more secure.


Where should a model number be on a HP computer?

Model number, serial number and other information placed on the bottom of your notebook, if you have desktop this information placed on side of machine.


What is placed in a computer?

A computer is comprised of the following: CPU (central processing unit), PSU (power supply unit), RAM (random access memory), HDD (Hard drive disk), a Motherboard, Optical drives, and a means of keeping all of this cool such as fans. Other things outside the case of the computer that are needed for operation include: A Monitor, Keyboard, and Mouse

Related questions

Will a program run if it is placed into ROM?

a program will only run if it is first place into


What is a lock out?

A Lockout occurs when an unauthorized lock is placed on property to prevent access to an owner or legal tenants. This can happen accidentally where multiple locks are required for several vendors or tenants who need access to a secure area, such as a cell tower, or meter readers and others at public buildings. An unauthorized lock, or a lock placed wrong can lock out the others who rightfully have access to the area. Since these are often remote areas, unserviced by a person, they can be costly in both money, time and service. It can also happen purposefully by landlords, legal authorities or with malicious intent.


What is a lock-out?

A Lockout occurs when an unauthorized lock is placed on property to prevent access to an owner or legal tenants. This can happen accidentally where multiple locks are required for several vendors or tenants who need access to a secure area, such as a cell tower, or meter readers and others at public buildings. An unauthorized lock, or a lock placed wrong can lock out the others who rightfully have access to the area. Since these are often remote areas, unserviced by a person, they can be costly in both money, time and service. It can also happen purposefully by landlords, legal authorities or with malicious intent.


If PHIPII is placed on shared folder what must individuals have in order to access the folder?

If PHI/PII is placed on a shared folder, what must individuals have in order to access the folder?


If PHIPII is placed on a shared folder what must individuals have in order to access the folder?

If PHI/PII is placed on a shared folder, what must individuals have in order to access the folder?


What is your future or dream company?

i want to be placed in investment banking....


What American space program placed a man on the moon?

nasa


What Is a program placed on a computer without the users knowledge?

spyware


Where is a data statement usually placed in a basic program?

Anywhere really. A data statement (or REM statement) - can be placed anywhere within the program, because the operating system ignores all REM statements.


What is the Definition of management from ten authors?

your answer will be placed in near future ok


Can a keystroke program be placed on a computer through an email with an attachment that is downloaded?

Yes.


Which type of control is most commonly placed in the Detail section in Access?

Text Box