The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

Answers

Answer 1

Answer:

Virusus

Explanation:

-

Hope that helps


Related Questions

write a program to print. *
**
***
****
*****​

Answers

Program:-

[tex]\tt for\:i \:in\: range(2,6):[/tex]

[tex]\tt\quad for\: j\: in \:range(1,i+1):[/tex]

[tex]\tt\quad\quad print("*",end='')[/tex]

[tex]\tt\quad print()[/tex]

Output:-

[tex]\tt **[/tex]

[tex]\tt ***[/tex]

[tex]\tt ****[/tex]

[tex]\tt *****[/tex]

create a parameter query where the user will enter a value to use as the criterion

Answers

Click in the Criteria row in the InsuranceType column and type [Enter Insurance Type]. Click the Run button. Type dental when prompted. Click OK.

The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the Regional Internet Registries (RIRs) who then:

Answers

Answer:

management, distribution, and registration of public IP addresses within their respective assigned regions.

susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct statements are correct her error

Answers

The recursive formula of the explicit formula [tex]A_n = 3 + 2n[/tex] is [tex]A_n = A_{n-1} + 2[/tex]

The explicit formula is given as:

[tex]A_n = 3 + 2n[/tex]

When n = 1, we have:

[tex]A_1 = 3 + 2(1)[/tex]

[tex]A_1 = 5[/tex]

When n = 2, we have:

[tex]A_2 = 3 + 2(2)[/tex]

[tex]A_2 = 7[/tex]

When n = 3, we have:

[tex]A_3 = 3 + 2(3)[/tex]

[tex]A_3 = 9[/tex]

So, we have:

[tex]A_1 = 5[/tex]

[tex]A_2 = 7[/tex]

[tex]A_3 = 9[/tex]

Rewrite the functions as follows:

[tex]A_1 = 5[/tex]

[tex]A_2 = 5 + 2[/tex]

[tex]A_3 = 7 + 2[/tex]

So, we have:

[tex]A_1 = 5[/tex]

[tex]A_2 = A_1 + 2[/tex]

[tex]A_3 = A_2 + 2[/tex]

Express 2 as 3 - 1

[tex]A_3 = A_{3-1} + 2\\[/tex]

Substitute n for 3

[tex]A_n = A_{n-1} + 2[/tex]

Hence, the recursive formula is [tex]A_n = A_{n-1} + 2[/tex]

Read more about recursive and explicit formulas at:

https://brainly.com/question/11235928

Understanding that protection of sensitive unclassified information is:

Answers

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

when demonstrating 2022 versa’s maneuverability, what available systems should you point out when backing up?

Answers

When demonstrating 2022 Versa's maneuverability, what you should you point out while driving in a parking lot is the excellent rearward visibility that is given or shown by the RearView Monitor.

2022 Nissan Versa is a new model by Nissan. They are known to have different technology and safety features. Its includes  automatic emergency braking with pedestrian detection, remote keyless entry etc.

This vehicle comes with 2 functions such as a 5-speed manual transmission or an Xtronic Continuously Variable Transmission. With this one can quickly adjusts to the best gear ratio for a easyy acceleration and efficiency.

Learn more about 2022 Versa's from

https://brainly.com/question/25980600

can’t be opened because apple cannot check it for malicious software.

Answers

Answer:

try to reset  your computer.

Explanation:

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

By the mid-1990s, how did revenue generated from video games compare to revenue generated from movies?

Answers

By the mid-1990s, the revenue generated from video games was two and a half times the revenue generated from movies.

Research shows that in 1994, the revenue generated from arcades in the United States was about $7 billion quarterly while the revenue generated from home console sales was about $6 billion dollars.

When combined, this revenue from games was two and a half times the amount generated from movies.

Learn more about video games here:

https://brainly.com/question/8870121

Answer:

Revenue made from video game sales still lagged behind revenue made from movies.

Write a program that outputs "Hello World!".

Answers

print(“Hello World!”)

I hope this helps :) I’m sry is this what you wanted or were you looking for something else because I’m willing to help either way.

how to send an email without showing recipients outlook

Answers

Answer:

Outlook. When you open a new blank email in Outlook, click on the “Options” tab. From there, you'll want to select the Bcc field in the message header. This is your “blind carbon copy” option, meaning that your email recipients will not see other names on the list.

Explanation:

With the goal of keeping your hardware safe, explain the physical hazards you should avoid.

Answers

Based on health safety procedures, the physical hazards you should avoid include "eyestrain."

What are Physical Hazards in Computing?

Physical hazards are computing are hazards that affect the physical body of the users due to operating the Computer system.

Different Physical Hazards in Computing

Back pain Neck and shoulder painsHeadacheEyestrainInjuries of the arms, hands, and thumbs, etc.

Hence, in this case, it is concluded that there are various physical hazards computer users need to avoid.

Learn more about Physical hazards in Computing here: https://brainly.com/question/5622984

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693

What software type is software that is distributed free of charge, but the source code is not available

Answers

Answer:

Closed Source software programs


DOES ANYONE KNOW COMPUTER SCIENCE?

Answers

Answer:

statClass.java

Explanation:

You use the classname of the public class.

One of those will contain main()

Note that this example has a typo. statClass vs startClass.

If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.

Answers

Map I think it is the answer

Katie is writing a print statement but nothing is printing. Which of the following should she check for?

A.
Make sure the print statement is surrounded by parentheses.

B.
Make sure the word print is in all capital letters.

C.
Make sure there is a colon after the print statement.

D.
Make sure the next line after the print statement is indented.

Answers

Answer:

A.

Explanation:

Parenthesis are required to be around the data in a print function. All the letters in a  print statement should be lowercase. A colon isn't required after a print statement. Indentation is not needed for a print statement because there are no colons after the statement instead. Here's an example where you would need to indent the line:

def randNum( x, y ):

    x = input("Enter number: ")

    y = input("Enter number: ")

    return x * y

Here's an example of a print statement:

print("My name is Sullen.")

to find detailed information about the origin of an email message, look at the ________________.

Answers

Email header. The email header is a code snippet in an HTML email, that contains information about the sender, recipient, email's route to get to the inbox and various authentication details

Please help explain Loops question. I will give brainliest.

Answers

Answer:

And 1 and 2 and 3

Explanation:

It is asked to display the 'and' every time, and the count is equal to 1 plus the previous count starting at zero, so it runs 3 times

to find detailed information about the origin of an email message, look at the ________________.

Answers

Answer: header

Explanation:

Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer:

false

true

false

true

false

Explanation:

.

what is a copy of a theme with different color schemes called?

Answers

Answer:

A copy of a theme with different color schemes is called a Variant

Explanation:

pa help please I need help
10 points :'(
nonsense report:
1 heart​

Answers

Answer:

√ 1. Cellphone

Product Description:

A cellphone is any portable telephone that uses cellular network technology to make and receive calls.

The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?

Answers

Answer: 45.45%

Explanation:

Time Passed: 4 hours

Difference in Temperature: 20°F

20/44 = .45454545454545

.45454545454545*100 = 45.45%

Correct me if I am incorrect.

Fill in the blank to complete the sentence.
Binary Digit 1 0 0 0 0 0 1 1
Decimal Equivalent of Place Value 128 ? 32 16 8 4 2 1
The missing place value is
.

Answers

Answer:

ANSWER:62

Explanation:i dont know just trust me

The base of every positional numeral system is ten, which is expressed as 10 in the decimal numeral system (also known as base-ten). It is the numeral system that modern cultures utilize the most frequently.

What Binary Digit Decimal Equivalent of Place Value?

In binary numbers, place values rise by a factor of 2, as opposed to decimal numbers, where place values rise by factors of ten. The symbol for a binary number is X2. Think about the binary number, 10112 as an example. The place value of the rightmost digit is 120, while the place value of the leftmost digit is 123.

Digits are used to fill in the spaces on the place value chart in the decimal system. Binary, on the other hand, is restricted to 0 and 1, therefore we can only utilize 0 or 1 with each location. In a binary place value chart, the binary number 1001 is positioned to the right.

Therefore, Decimal Equivalent of Place Value 128 64 32 16 8 4 2 1.

Learn more about Binary Digit here:

https://brainly.com/question/20849670

#SPJ2

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844


Pls help me pls I’m struggling

Answers

you have it correct

congress are smart becuase.....

Answers

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge

Answers

Hmmm when they say that we have a debt of $10,000 but you don't but you don't know that so they ask you for the personal data for your bank so their can get in and get the money for you so you don't have to and that how they trick you

PLEASE I NEED HELP ASAP PLEASE PLEASE!!!

For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.

Answers

Answer:

Following are the program in the Python Programming Language

#set variables to 0

positive_sum=0  

negative_sum=0  

#print message  

print("Enter 0 to terminate")  

#set the while loop  

while(True):  

#get input from the user  

num=float(input("Enter positive or negative numbers: "))  

#set if statement to check condition  

if(num==0):  

  break  

elif(num>0):  

  positive_sum+=num  

else:  

  negative_sum+=num  

#print output with message  

print()  

print("sum of positive numbers: ", positive_sum)  

print("sum of negative numbers: ", negative_sum)  

Output:  

Enter 0 to terminate  

Enter positive or negative numbers: 1  

Enter positive or negative numbers: 3  

Enter positive or negative numbers: 5  

Enter positive or negative numbers: -7  

Enter positive or negative numbers: -2Enter positive or negative numbers: 0  

sum of positive numbers:  9.0  

sum of negative numbers:  -9.0

Explanation:

Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.

Then, we set the while infinite loop inside the loop.

Set a variable "num" and get input from the user in it.

Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.

Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"

Otherwise, add that input and store in the variable "negative_sum".

Finally, we print the output with the message.

Other Questions
At the end of chapter 39, Tom writes a "nonnamous" letter to the Phelps family. His letter is full of slang and colloquialisms. Write an essay of at least 150 words (in standard English) based on this letter, explaining what Tom wants the family to believe and clarifying any language that needs to be explained. My class is doing a court case on Tell-tale Heart. I need 15 questions for people in the room. Please read the tell-tale heart then think of questions that could help me win my case against the narrator.I need 7 questions for the narrator5 questions for the copsand 3 questions for the neighbor Jonna mixes 1/4 of a gallon of orange juice with 1/2 of a gallon of pineapple juice to make punch. One serving is equal to 1/16 of a gallon. How many servings of punch can be made? when rounding to estimate this difference, what do your do first?ILL GIVE BRAINLIEST WHO EVER DOES IT FIRST!!!2,125-1,025a. round the subtraction problem to 2,000 - 1,000b. round the subtraction problem to 2,100 - 1,010c. subtract the digits in the ones place a network consisting of nodes covering a small geographic area is a Rudo remains detached at school and does not get involved emotionally. He doesn't seem to care that his classmates perceive him to be what he is not. Karen Horney's psychoanalytic theory suggests that Rudo has a neurotic trend of What caused the Gupta Empire to become powerful?an interest in the arts and literaturethe Hindu religiontrade and the growth of citiesthe location of the empire What happens to the value of the expression 20 + a, a as a increases? HELP PLZ PLZ ITS DUE IN 30 MINUTES Someone please help this is soooooo hard some people say failure can lead to sucess give a reason to disagree what is 5y if y= -1 over the past century, black cinema has consistently offered ________. Which of these is FALSE? aCells use ATP for cell work bBreaking down glucose gives off energy cBreaking down ATP gives off energy d1 ATP has more energy than 1 glucose Name each polynomial by degree and number of terms .1) -10x2) -10r4- 8r23) 74)9a6 + 3a5 - 4a4 - 3a2 + 95)-3n3 + n2 - 10n + 96) 7x2 - 9x - 10 7) -4b8) -9 + 7n3 - n2 The Nuremberg Laws stated all Jewish citizensin Germany had to wear what?A. A German flag.B. A yellow star of David.C. A black hat. what is Nuclear Fusion. 75% of 32 students are interested in Mathematics. How many are not interested in Mathematics ? One result of economic growth during the so somg period was urbanization which means simplify.|6 + (3)|(3) + 8 2