What is a worm?
the process of using e-mail to trick a user to share personal information
a type of virus that targets programs and files, and duplicates itself like a biological virus
O a type of software designed to secretly capture personal information and track online activities
O a type of virus that spreads from computer to computer through a network connection

Answers

Answer 1

Answer:

Answer is a type of virus that spread from computer to computer through a network connection

Explanation:


Related Questions

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

brain of the computer system is called​

Answers

Answer:

central processing unit in short form CPU :)

Answer:

The Central Processing Unit(CPU)

Explanation:

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results.

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

who invented the Bluetooth device​

Answers

Answer:

The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.

Explanation:

according to this website www.androidauthority.com/history-bluetooth-explained-846345/

Answer:

alexander - edg 2022

Explanation:

cuales son los signos de exel

Answers

Answer

explanation

Operador de comparaciónSignificadoEjemplo< (signo menor que)Menor que=A1<B1>= (signo mayor o igual que)Mayor o igual que=A1>=B1<= (signo menor o igual que)Menor o igual que=A1<=B1<> (signo distinto de)No es igual a=A1<>B1

Answer:

¿Qué quieres decir?

Explanation:

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class SuperStats. You recently heard about another statistics library UberStats with supposedly significantly better performance than SuperStats. Explain how you would redesign the DataViz class using the Adapter pattern so that DataViz can be configured at runtime to use either SuperStats or UberStats. Does your design use dependency inversion and/or dependency injection? Explain

Answers

Answer:

By using dependency injection, create the adapter to adapt both the DataViz and the UberStats interface as expected.

Explanation:

Adapters are used in Objected-oriented programming to run or convert the output of one class object to another. The DataViz class currently uses the SuperStats class as an adaptee to get and output statistical results.

Write a new code from the scratch is tedious, so, the UberStats class dependencies are injected in the adapter and the DataViz and UberStats class functionalities can be experimented with.

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

Select the correct answer from each drop-down menu.
Kawika is a math teacher. His students recently took a test. He has recorded their scores in a spreadsheet, using functions to analyze the scores. Which functions should he use to determine the top and mean scores?

Kawika can use the ____ function to find the top score and the ____ function to find the mean score.

First blank:
1. MIN
2. COUNT
3. MAX

Second blank:
1. AVERAGE
2. ROUND
3. SUM

Answers

Answer:

First blank:  MAX

Second blank:  AVERAGE

Explanation:

Required

Complete the blanks

The first blank is to be filled with a function that calculates the highest score from a given range of scores (cells).

To do this, we make use of the MAX function, and the syntax is:

=MAX(cell_range)

The second blank is to be filled with a function that calculates the mean score from a given range of scores (cells).

To do this, we make use of the AVERAGE function, and the syntax is:

=AVERAGE(cell_range)

Answer:

MAX

AVERAGE

Explanation:

I got it right on the Edmentum test.

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

1. __ and ___ were used in first generation computers

Answers

Answer:

Explanation:

vacuum tubes  and punched cards were used in first generation computers.

I needed help with this answer thanks for your help.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

what is the behavior of an element with static positioning in regard to the page layout?

Answers

Answer:

The element is positioned according to the normal flow of the document.

The top, right, bottom, left, and z-index properties have no effect. This is the default value.

The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.

What does Static positioning implies?

Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."

Hence,  the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.

Learn more about page layout from

https://brainly.com/question/988590

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

This Is for game design

Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc. You’re in charge of writing the safety rules and regulations for the company. Provide at least four discrete rules you would implement

Answers

1. Don’t give out any company information to someone who doesn’t work for the company.
2. Credit sources found from others games or anything that has a copyright claim.
3. Don’t abuse your power such as exploiting the games or hacking it to help yourself or friends.
4. Treat everyone with upmost respect
Other Questions
How did world war 1 impact Kentucky? (I need a paragraph) Solve for x. Round to the nearest tenth, if necessary.P29Q-6.6R 9. Who ruled in Tamil Nadubetween the seventh andtwelfth centuries?Options a. Rashtrakutasb. Cholasc. Chalukyas d. None of these 1Abdullah tracked the scores of his Science tests this year.93, 71, 86, 95, 72, 81, ?He lost the score from his final test, but knows he had a mean score of 82.Calculate his missing score.76 OActivate WindowsGo to Settings to activate Windows.11:30 AM5/31/2021Desktop4) GG ENGO10 How many students were questioned about the approximate number of text messages they send each day? Explain orshow how you arrived at your answer. an element that can bioaccumulate in lead to biomagnification is ____ a. hydrogenb. oxygenc. argond. Mercury What are the qualifications for a Supreme Court Justice? 90 grams of NaNO3 were added to solution at 10 degrees Celsius. What type of solution was formed? Define emf of a battery? they had been calling you. change into present perfect tense Using the prompt provided, determine the correct Spanish translation.1.I like (the) shoes.Group of answer choicesme gusta los zapatosme gustan los zapatosme gusta los zapatosme gusta los zapatos2.he likes the artGroup of answer choicesle gustan los artele gusta el artele gustan el artele gusta los artes3.they like the concertGroup of answer choicesellos gusta el conciertoa ellos gusta el conciertoa ellos les gusta el conciertoles gustan el concierto4.we like the shirtGroup of answer choicesnos gustamos la camisanos gustan la camisanos gusta la camisanostostros gustamos la camisa5.you pl/fam like the clothesGroup of answer choicesvosotros os gusta la ropaos gustan la ropaa vosotros os gusta la ropavosotros gusta la ropa6.they like the skirtGroup of answer choicesa ellas les gusta la faldaall answers are correcta ellos les gusta la faldales gusta la falda7.I like the red socksGroup of answer choicesme gusta los calcetines rojosa m me gustan los rojos calcetinesme gustan los rojos calcetinesa m me gustan los calcetines rojos8.you s/fam like the black shoesGroup of answer choicesa ti te gustan los negros zapatosa ti te gustan los zapatos negrosa ti te gustan los negro zapatosa ti te gusta los zapatos negros9.you s/fam don't like the restaurantGroup of answer choicesno te gustan el restaurantet no gusta el restauranteno te gusta el restauranteti no gusta el restaurante10.Do you (s/fam) like airplanes?Group of answer choicesTe gustas los aviones?Te gusta los aviones?Ti gustan los aviones?Te gustan los aviones? Cranston wants a Settlement Option for his beneficiary that will guarantee the beneficiary an income as long as the beneficiary lives. Cranston should choose: A Interest B Life Income Only C Fixed Period D Fixed Amount The roof of a house has three layers: (1) 2 inch thick pine, (2) 4 inches of fiberglass insulation and (3) 0.1 inch thick Asphalt shingles. Calculate the rate of flow of heat (BTU/hour) through the roof. The temperature inside the house is 700F and the temperature outside is 300F. The R/inch for pine is 1.28, the R/inch for fiberglass is 3.0 and the R/inch for Shingles is 4.0. Take the area of the roof to be 500 square feet. The Unit of R is mixed: ft2 . 0F.h/BTU True/False Indicate whether the sentence or statement is true (A) or false (B). 1. In April 1865, Johnston and Lee both saw that the war was over and surrendered instead of fighting a guerilla war. 2. Jefferson Davis agreed with Lee and surrendered instead of running and hiding. 3. The main reason for the defeat of the South was its lack of troops and supplies. 4. The three men credited with ending the war peacefully as Lincoln wanted it were Grant, Sherman, and Lee. 5. The U.S. Civil War officially ended on April 9, 1865 with Lee's surrender at Appomatox Court House, Va. 6. Jefferson Davis was captured by Union Troops while dressed like a woman Silver nitrate, AgNO3, reacts with ferric chloride, FeCl3, to give silver chloride, AgCl, and ferric nitrate, Fe(NO3)3. In a particular experiment, it was planned to mix a solution containing 25.0 g of AgNO3 with another solution containing 45.0 grams of FeCl3. Write the chemical equation for the reaction. Read the dictionary entry- bunting help fast please lol PROMPTThere is an enormous amount of information on the internet, but not all of it is true. Unfortunately, social media users often cant tell whether the content they see is fake or real.Read these texts:How Trustworthy Is Social Media?Digital DetectivesFakeoutNow, imagine your classmates dont know about the negative consequences of false information, photos, and videos. Write an essay explaining why fake content is dangerous. You should use evidence from the texts, and you can also use real-world examples to support your central idea.If you get stuck, try using the tips and lessons on the left side of the screen to help you out!If youd prefer, you can open this https://noredink-product.s3-us-west-2.amazonaws.com/texts/Spotting+Fakes+Online+Text+Set.pdf PDF Versions of the texts.QUESTION: Can someone write a paragraph which shows: Title, Introduction, 3 body paragraph, and a conclusion? Thanks! What is the value of K ?