Viruses and worms can affect a system by:
A. Deleting hard drives
B. Slowing down the system
C. Improving system functions
D. Productive fake applications

Answers

Answer 1

Answer:

A

Explanation:

Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Sometimes a computer worm's purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network

Answer 2
A is the correct answer boss

Related Questions

One key feature of malware is that it:
A. Can only work individually
B. Can only on certain operating systems
C. Can work jointly with other malware types
D. Can always be stopped by antimalware software

Answers

Answer:

Can work jointly with other malware types

What complications are imposed if one tries to implement a dynamic list using a traditional one-dimensional array

Answers

Answer: The expansion of the list will be required to move to a new location;

So the complications that will be imposed if one tries to implement a dynamic list using a traditional one-dimensional array is that the expansion of the list will need to move to a new location.

Explanation: When we talk about arrays,we are referring to data structures that are useful when the number of entries that are to be stored inside a list is fixed.

But for one to implement a dynamic list which always grows or shrinks at run-time arrays cannot be useful.This is because any alteration will make the entire array to be altered.

BRAINLEST AND 20 POINTS! Most GUls provide all of the following except

-command prompts

-desktops

-icons

-menus

Answers

Answer:

command prompts

Explanation:

Command prompts :) hope it helps

Reports produced by the United Nations are considered
O relevant sources, -A
O irrelevant sources. -B
O biased sources. -C
O disputed sources. -D

Answers

Answer:

The correct answer is Option A: "Relevant Sources"

Explanation:

Relevant sources are the reports and information regarding a specific field, profession or an area of study. The reports generated by United Nations are usually related to a specific subject or area of study i.e. report on security etc.

Hence,

The correct answer is Option A: "Relevant Sources"

Answer: relevant sources

Explanation:

Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it?

Answers

Answer:

The threats agents may  be interested in attacking includes  

Dos ( denial of service ) Attacks. Blackmailing end-users for information. Attacker can buy products for no price ( zero price )The threat of raising prices of products with fake valueTheft of the products at return The threat of  the miss use of personal details of customers.

Explanation:

Since the Appmaker implements a customer-facing store that processes financial transactions

The threats agents may  be interested in attacking includes  

Dos ( denial of service ) Attacks. Blackmailing end-users for information. Attacker can buy products for no price ( zero price )The threat of raising prices of products with fake valueTheft of the products at return The threat of  the miss use of personal details of customers.

A job placement agency helps match job seekers with potential employers. The agency
would like to design a simulation in order to help predict the likely job placement
outcomes for job seekers based on historical trends and patterns. Which of the following
is most likely to be a benefit of the simulation?

Answers

Answer:

The answer is "Option C".

Explanation:

Please find the complete question in the attached file.

The model presented above is an AI design. The specific variable within each AI model becomes reduced. There is also no AI model showing 100% reliability, or just not as reliable as just a man in certain situations. That is why the option C opposes this fact explicitly, and that model is least likely to benefit.

A box has an equal number of red and green balls. What is the probability of a red ball being chosen if the box has a total of 24 balls

Answers

Answer:

50%

Explanation:

Cuz

As a top-level executive at your own company, you are worried that your employees may steal confidential data too easily by downloading and taking home data onto thumb drives. What is the best way to prevent this from happening?

Answers

Answer:

Explanation:

The best thing to do would be to include a ban on thumb drives in the employment contract, that way any employees that bring/use thumb drives would be in violation of their contract and would have to deal with the consequences. Another backup strategy would be implementing a security measure in all of the employee computer systems in order to prevent USB thumb drives from connecting to the computer.

how can e-group help in collaborating online​

Answers

Answer:

Collaborative learning is an e-learning approach where students are able to socially interact with other students, as well as instructors. ... Collaborative learning is based upon the principle that students can enrich their learning experiences by interacting with others and benefiting from one another's strengths.

Explanation:

inclusion of collaborative activities in an online course leads to positive student performance outcomes. Collaborative group interactions facilitate active learning, shared knowledge, and promote social interaction and a supportive eLearning community

3. Which of the following components would not normally be found on an industry standard
motherboard?
A. Keyboard controller
B. CPU
C. Video controller
D. Modem​

Answers

Answer:

B.

Explanation:

because it is computer science unit(CPU) is the portion of a computer that retrieves and executes instructions.

To answer the research question "how I'm I going to find the information I need on the topic?" The best thing Georgia should do first is

Answers

Answer:

it is currently c

Explanation:

because i got it right on a quiz trust me!

(TCOE) When a customer purchases software that displays a clickwrap agreement at the time of installation, the consumer has already purchased the product and is being asked to consent to the contract that purportedly memorializes the payment. Is the contract formed at the moment of purchase or later, when the buyer assents to the terms of the clickwrap agreement?

Answers

Answer:

The analysis is presented throughout the section described, as per the given situation.

Explanation:

Those requirements as well as agreements do not apply to something like the acquisition of the commodity. But perhaps the terms and agreements are all about the use of the name. This means that for illegal or immoral procedures, when and how to use the item and even the component shouldn't be used. The overall profitability certainly comes with either the commodity themselves as well as during implementation, trying to give one's authorization has always been about the service mostly with the supplier.

However, during implementation, the contract is something different from the place where you live throughout your purchase.

please tell fast plzzzzzzzz​

Answers

Answer:

window.............

Answer:

Window

Explanation:

Im not sure if this is correct, but I'm pretty sure

features present in most DUIs include _________________?​

Answers

Answer:

"Common features provided by most GUIs include: -icons; ... The icons displayed on most desktops represent resources stored on the computer—files, folders, application software, and printers. Another icon commonly found on the desktop is a place to discard items."

Explanation:

plz mark braniliest i answered first

What is the definition of delimited text? Characters are separated by commas or tabs. Characters are separated by spaces. Characters run together without separation. Characters have no limit.

Answers

Answer:

delimited: having fixed boundaries or limits.

Explanation:

Go from there with that definition

Answer:

A. Characters are separated by commas or tabs.

Explanation:

On Edge

Write a complete program that reads a string and displays the vowels. The vowels are A, E, I, O, U and a, e, i, o, u. Here are three sample runs:
Sample Run 1
Enter a string: Welcome to Python
The vowels are eoeoo
Sample Run 2
Enter a string: Student Union
The vowels are ueUio
Sample Run 3
Enter a string: AREIOUaeiouRTE
The vowels are AEIOUaeiouE
Note: your program must match the sample run exactly.
using python

Answers

vowels = "aeiou"

txt = input("Enter a string: ")

print("The vowels are ",end="")

for x in txt:

   if x.lower() in vowels:

       print(x, end="")

I hope this helps!

Write a SELECT statement that returns these four columns:

vendor_name-The vendor_name column from the Vendors table
invoice_number The invoice_number column from the Invoices table
invoice_date The invoice date column from the Invoices table
balance due The invoice total column minus the payment total and credit total columns from the Invoices table

Use these aliases for the tables: v for Vendors and i for Invoices.

Return one row for each invoice with a non-zero balance.
This should return 11 rows. Sort the result set by vendor_name in ascending order

Answers

Answer:

SELECT vendor_name, invoice_number, invoice_date,

(invoice_total - payment_total - credit_total) AS balance_due

FROM vendors AS v JOIN invoices AS i

ON vendors.vendor_id = Invoices.vendor_id

WHERE invoice_total - payment_total - credit_total > 0

ORDER BY vendor_name;

Explanation:

The query statement returns joint records of vendor name, invoice number, invoice date, and balance due from the vendor and invoice tables represented with aliases v and i respectively.

It returns an output with the WHERE clause condition to only return balance due greater than zero and the output is returned in ascending order of the vendor's names.

The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system. A. True B. False

Answers

Answer:

B. False

Explanation:

The term Super user do (sudo) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system.

On the other hand, a Linux Intrusion Detection System can be defined as a patch to the operating system kernel of the Linux machine, as well as a set of administrative tools that is typically used to improve the security of the Linux kernel through the implementation of a mandatory access control known as MAC.

Hence, the Linux Intrusion Detection System can be used to deny any unauthorized use of the input or output device, memory, raw devices, file access and other network administrative functions.

What is Cathode Ray Tube ?

Answers

Answer:

it is cathode ray tube used for display

Explanation:

Write the function definition for the generato named 'generator_Magic which takes a single parameter 'n1', an Intege 1. Define the above Generator such tha it should yield the Magic constant(s) for the values starting from 3 to 'n1'. Note Printing the output will be taken care of during testing, so you need not print the Magic constants yielded by generator 'generator_Magic' and its Type. Input Format for C

Answers

Answer:

Method definition to this question can be defined as follows:

def generator_Magic(x1):#defining a method generator_Magic that accepts a variable  

   x = 3#defining a variable n that holds a integer value

   while x <= x1:#defining while loop that check value of x less than x1  

       Val = (x * (( x * x) + 1)) / 2#defining val variable that calculate value  

       #yield val

       return Val#return Val

       n = n + 1#increment the value of n

Explanation:

In the given question some of the data is missing that's why we only define the code, which can be defined as follows:

In this code a, method "generator_Magic" is declared, that hold one parameter "x1" in its parameter, and inside the method, a variable x is declared that hold an integer value and define a while loop to check value is greater than equal to "x1" and calculate the value into "Val" variable and return its value.

5. Identify the invalid data in the worksheet and correct the entry as follows: a. Circle the invalid data in the worksheet. b. Type 15 as the minimum number of trainees for the Tech Skills program (cell C5). c. Verify that this change cleared the remaining errors in the worksheet

Answers

Answer:

a. Use conditional format, select the worksheet, input a condition in a given column, and use a circle to format the invalid data rows.

b. Double-click on cell C5, delete the current data and input 15.

c. If the errors are corrected, the circles are removed.

Explanation:

Microsoft Excel is a spreadsheet application used to manipulate statistical data. It is made up of cells arranged in rows and columns. There are several built-in formulas and tools used to analyze data.

The conditional formatting tool is an example of excel tools used for analysis. In conditional formatting, a pattern is selected to be used in a selected column or worksheet if a condition is met, if not, the pattern will not be used.

Some examples of malware include:
a. Robots, virus, and worms
B. Trojans, worms, and bota
C. Computer ware, worms, and robots
D. Worms, system kits, and loggerware

Answers

Answer:

i thinks its c hehehe yea

Answer:

I believe it's C

Explanation:

the reason is because malware usually effects the computer ware

a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of public interest and that often carries advertising​

Answers

Answer:

adsfafdfads

Explanation:

afdafdsa

What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?

Answers

Answer:

The fifth-generation wireless broadband technology based on the 802.11ac standard is called the

5G.

Explanation:

The 5G is the newest baby in town in the area of wireless broadband technology.  The technology is based on the IEEE 802.11ac standard. 5G operates with a 5Ghz signal and is set to offer out-of-this-world speeds of up to 1 Gb/s.  This implies massive connectivity for everyone and everything.  However, its trial has been fraught with many challenges.  Questions have been raised, especially relating to some health concerns about the technology.  However, many advantages have been ascribed to this wireless technology.  They include more reliability, massive network capacity, increased availability, more uniform user experience, higher performance. and improved efficiency.

How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 points and mark you as brainliest.

Answers

Answer:

It's physically impossible. You'd have to go to the nether and kill one of the nether slimes.

Explanation:

Or you can just cheat, give yourself creative and give yourself a fire res potion. Plus, you can't brew anything without a brewing stand or nether wart.

Answer:

Get a trident from a drowned and enchant it with Channeling and strike a villager with it. Contain the witch and burn it using flint&steel. It will try to drink the potion, but kill it as fast as you can. There now you can go through the Nether portal without having to worry about lava.

Explanation:

"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequence. Create a for loop that compares the two strings. For each match, add one point to user_score. Upon a mismatch, end the game.
Sample output with inputs: 'RRGBRYYBGY' 'RRGBBRYBGY'
User score: 4
in python please

Answers

import random

letters=["R", "G", "B", "Y"]

i = 0

to_guess = ""

while i < 10:

   to_guess += random.choice(letters)

   i += 1

print("Simon says "+to_guess)

user_score = 0

user = input()

for x in range(0, len(to_guess)):

   try:

       if user[x] == to_guess[x]:

           user_score += 1

       else:

           break

   except IndexError:

       break

print("User score: "+str(user_score))

I hope this helps!

Answer:

import random

validletters=["R", "G", "B", "Y"]

input1 = ""

for i in range(1,11):

     input1 = input1 + random.choice(validletters)

input2 = input("Input String 2: ")

if len(input2) != 10:

     print("Invalid Length")

else:

     user_score = 0

     for i in range(0,10):

           if(input1[i] == input2[i]):

                 user_score = user_score + 1

           else:

                 break

     print("String: "+input1)

     print("Guess: "+input2)

     print("User Score: "+str(user_score))

Explanation:

The code assumes that user input will always be R, G, B or Y

The next two lines get two string user inputs

import random

This lists the valid letters

validletters=["R", "G", "B", "Y"]

This initializes an empty string

input1 = ""

The following iteration generates the input string of 10 characters

for i in range(1,11):

     input1 = input1 + random.choice(validletters)

This prompts user for input string

input2 = input("Input String 2: ")

This checks if input string is up to length of 10

if len(input2) != 10:

If yes, it prints invalid length

     print("Invalid Length")

else:

If otherwise, user_score is initialized to 0

     user_score = 0

The following iteration checks for matching characters in both strings

     for i in range(0,10):

           if(input1[i] == input2[i]):

                 user_score = user_score + 1  This increments user_score by 1 if there is a match

           else:

                 break  This ends the program if there is no match

The next three lines print the strings and the user score

     print("String: "+input1)

     print("Guess: "+input2)

     print("User Score: "+str(user_score))

What is the output?
numB = 25
while numB > 13:
numB = numB - 5
print(numB)
Output:

Answers

Answer:

Output: 10

i tried out the code and it outputted 10.

Answer:

10

Explanation:

I got it right

Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out the day of the week that fell on that date. According to the Gregorian Calendar, January 1, 1601 was a Monday. Observe all leap years (and keep in mind that 1700, 1800, and 1900 were not leap years).

Answers

Answer:

import datetime

user = input("Enter date in yyyy,m,d: ").split(",")

int_date = tuple([int(x) for x in user])

year, month, day =int_date

mydate = datetime.datetime(year, month, day)

print(mydate)

x = mydate.strftime("%B %d, %Y was a %A")

print(x)

Explanation:

The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.

Which command provides the source reference on the last page of a document?

A.Citation
B.Endnote
C.Footnote
D.Reference

PLS help

Answers

Answer:

C. Footnote

Explanation:

QOTD: What are some real-world situations that involve infinite loops, for loops, and while loops? (BRAINLIEST BEST ONE) Around 150 words needed (WILL GIVE BRAINLIEST)

Answers

Answer:

There's not many things that are infinite the earth not infinite sooner or later the sun will grow cold and all life on earth will vanish. The only real thing that's infinite is space and time there's nothing that can measure something that's infinite goes on for light years upon light years infinite thing. That and time that never ends nobody really knows how long that the world has been made. The universe could have been made long before the so called big boom happened. last but not least god he is the infinite thing way before the cosmos were made. He made the cosmos and everything that's in your head to. without him you would not even been born. There you go all the infinite things that are infinite.

Explanation:

Your Answer:

Infinite Loop: I would say time and space for it never ends but I would also say human life. Why? Once you die you will be revived and reincarnated and live forever once that happens.

While loop: The water cycle would be a while loop for it will go on as long as earth and water exist. But Earth will probably not live forever.

For loop: Like the other person said, people working hard each month would be considered a for loop.

---------------------------------------------------------------→

I hope this helped!

--Juri Davis

Other Questions
This is beginning review and i for got how to do it pls help me find what x= Is the equation [tex]-2x^2+8=y[/tex] linear or nonlinear how did settlement change durning this time period? Enter the equation of the line in slope-intercept form.The line parallel to y =74x + 4 that passes through (8, 0).The equation of the line that passes through (8, 0) is y = . Is 5.33333..... (3 continuing) rational or irrational? How do you imagine the other characters (not Prospero) in The Tempest? Pick your favorite character and spend 45 seconds describing your interpretation of that character. Paul is comparing the cost of cell phone services. At CellCoA, the phone he wants costs $305 and the unlimited calling plan costs $45 permonth. At CellCoB, Paul can purchase the same phone for $350 and get an unlimited calling plan for $30 per month. In how many monthswill both plans cost the same?These equations, which are graphed below, represent the situation.y = 45x + 305y= 30x + 350Here, x represents the number of months and y represents the amount paid.80706010) Answers to The Bake Sale by Ms Modero List the side lengths from shortest to longest. How did the invention of an airplane totally change peoples views of the world? For a standard normal distribution, find:______. P(z < -0.34) Express the probability as a decimal rounded to 4 decimal places. Is 60n + 12 equal to 12(5n + 1) How would you handle the conflict ? You recently purchased a pair of shoes and the store clerk was very rude and unhelpful. You return to the shoe store indicating dissatisfaction concerning your service by the store clerk. You ask to speak to the manager, Bella. Bella then loudly argues with you, and you have a heated argument in full view of all the waiting customers. Can somebody pweasse give me a good introduction and thesis paragraph for my essay what does a poppy symbolize? I dont have a good one :(WILL MARK BRAINLIEST It the same child has a velocity of 2 m/s half-way down the slide, what is his kinetic energy? Can someone write a paragraph explaining this drawing of thermal energy. Please dont use google, I'll mark brainiest and give extra points help me please will mark brainliest Need help please????!!!!!! Help please! I beg you If 10.0 g of NaF and 15.0 g of HF are dissolved in water to make 2.0 L of solution, what is the pH of the resulting solution?