Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
A(n) ______ database is a huge database used to analyze transactions. a. object-oriented b. relational c. data warehouse d. distributed
Answer:
c. Data warehouse
Explanation:
Data warehouse is a system used for reporting and data analysis. As you need to analyze transactions, so that is the database that fits better for your case.
Which of these questions would help you determine the context of a
television commercial?
A. Where was my television made?
B. Why was this commercial made?
C. How long is this commercial?
D. How well do I like this commercial?
What are the top 10 most dangerous computer viruses ?
Answer:
MydoomSobigKlezILOVEYOUWannaCryZeusCode RedSlammerCryptoLockerSasserExplanation:
Vector images generally do not permit fonts
True or False
Answer:
false
Explanation:
You can use fonts on a majority of programs
which tool would you use to configure the paging file location and size on a windows system?
Utility software, such as virus checker, screen saver, and security software, is usually installed on a PC ____.
Answer:
Operating System
Explanation:
The operating system is meant to run software.
25POINTS
Bias in the development of computational artifacts often arises from _____.
SELECT 2 answeres
A. testing software
B. including outliers
C. conscious bias
D. unconscious stereotyping
E. accurate data
Answer:
the answer would be A
Explanation:
Answer: unconscious stereotyping & conscious bias
Explanation: have a good day/ night <3!
4.
(1 pc
If
1-
= 100 and
= 10, what number is represented below?
A 471) B 470) C 740) D 4,700
Answer:
my answer is 470
Explanation:
hope it helps and good luck on your studies
Answer:
470
Explanation:
First, think, how many blocks are there in the picture?
Remember 100 is bigger than 10, so the blocks or cubes have more value.
If you look, there are 4 blocks, so you now know 4 is your first digit.
Now, look...
How many sticks are there?
7 in the picture.
So...
Now you know 7 is your second digit.
Since there is no "one's", fill in the third digit with a zero, because there is no "one's" in this picture.
Therefore, 470 is your answer
-kiniwih426
iii i don't need help but here
Answer:
please stop posting some nonsense questions this is only make if there's a problem in your module or test
Explanation:
Please stop it
The memory address that is saved by the system when a method is called and is the location to which the system should return after a method ends is known as the ________.
Answer:
Return point
Explanation:
Raina is putting finishing touches on her ph. D. Thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?.
Raina can emphasize the keywords throughout the thesis by: Changing font size, style, and color of the keywords.
A word processor can be defined as a processing software application that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.
In Computers and Technology, some examples of a word processor include:
Microsoft WordNotepadSublime textIn this scenario, Raina should use the word processor to emphasize the keywords throughout the thesis by doing the following:
1. Changing font size.
2. Changing font style.
3. Changing font color for the keywords only.
For example, this formatting method is usually adopted by most expert tutors while answering questions on Brainly.
Read more on word processor here: https://brainly.com/question/24043728
Where can you search and download office templates?
To participate in a video conference, what additional equipment do you need attached to your computer
Answer:
you need a mic, and head phones
Explanation:
you need a mic so you may speak with others, and headphones to hear them and so you wont distrub others
Write a method called distance that (1) accepts four integer coordinates: x1, y1, x2, y2 as parameters, (2) computes the distance between points (x1, y1) and (x2, y2) on the map, and (3) returns that distance.
The equation for the distance is: sqrt ((x2 - x1)2 + (y2 - y1)2).
Test out your program by writing a main method that calls the distance method for each of the following pairs of cities. Your main method should output the value returned by the distance method.
Distance from Baltimare to Manehattan =
Distance from Los Pegasus to Neighagra Falls =
Distance from the Badlands to Ponyville =
in python
Answer:
import math
def distance(x1, y1, x2, y2):
return sqrt( (x2-x1)*2 + (y2-y1)*2 )
What do you call applying and reconciling updates from various copies of a database with the master copy
Data can be replicated in different ways. The act of applying and reconciling updates from various copies of a database with the master copy is called synchronization.
Database synchronization is simply known as the ways of keeping data steadily between two or more databases. It is known to have all round spontaneous copying.Data synchronization is therefore known as the synchronizing of data between two or more devices and keeping up with the new updates immediately between them to keep consistency within systems.
Conclusively, with synchronization, one can have all copies of data and their updates.
Learn more about synchronization from
https://brainly.com/question/25541016
which data validation alert style should you use to prevent the user from entering invalid data?
Answer:
stop
Explanation:
If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.
You understand the different standards around cabling and how to terminate your own Ethernet cables. Let’s discuss the pros and cons of making your own cables versus buying premade cables.
Answer:
hi
Explanation:
because I am new gggg and I will be
Storage that is wiped clean when power is cut off from a device is known as _____. Question 24 options:
Answer:
Volatile memory
Explanation:
Storage that is wiped clean when power is cut off from a device is known as votatile memory
one security component that doubles as a network component
Answer:
is the sentence above the question?
Answer:
It is to enter the site and then it will protect you in terms of form and appearance, and so on as required
the term information technology was first used what year?
Answer:
1958
Explanation:
The term was first published in the 1958 Harvard Business Review when authors Harold J. Leavitt and Thomas C. Whisler said “the new technology does not yet have a single established name. We shall call it Information Technology.”
Answer:
your answer would be 1985
Explanation: "The term information technology in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Harold J. Leavitt and Thomas L. Whisler commented that "the new technology does not yet have a single established name. We shall call it information technology "
when does iron most likely to develop rust on it
1/10
? Assessment
Why is a Quality Assurance tester needed on a software development team?
None of the above
They test the game to make sure that
the instructions make sense and that
there are no problems.
They are needed because they test
the game and come up with new
ideas for the plot and creative
solutions to gameplay.
They are able to make sure that the
game will be really interesting to users
and unlike any game they've played
before
ננס
Do
Answer: B
Explanation: They test the game to make sure that
the instructions make sense and that
there are no problems.
A gap or weakness in a security program that allows a threat to find a way into the system is called a
vulnerability
hope this helped <3
Which document would be best created using Word Online?ANIMATIONGRAPHRESUMESPREADSHEET
Answer:
resume
Explanation:
Printed on paper, how many pages of ones and zeros would it take to print the contents of a 16GB of memory from a device, such as a phone
Printed on paper 31364861.55354 pages of ones and zeros are required to print the contents of a 16GB memory.
To know how many pages of zeros and ones are needed to print the content of a 16GB memory, it is necessary to take into account that each bit is equivalent to a character, that is, a one or a zero.
Additionally, you have to know how many bits are 16GB equivalent.
16GB equals 128000000000bitsLater you have to know how many characters (bits) fit on a page, which are 4081 characters.
So, we divide 128000000000 into 4081128000000000bits / 4081 = 31364861.55354
According to the above, 31364861,55354 pages are needed to print the content of a 16GB memory.
Learn more in: https://brainly.com/question/2545808
CUAL ES LA FUNCION EN LA TECNOLOGIA ACTUAL, DE LAS TARJETAS DE DESARROLLO?
Las tarjetas de desarrollo juegan un papel fundamental en la tecnología actual, ya que son capaces de brindar seguridad y confidencialidad a la información contenida en la memoria, haciendo que los procesos sociales y organizacionales sean más sencillos y seguros.
Un circuito integrado de tarjeta es capaz de actuar como microprocesador, donde se ejecuta la lógica programada, con diversas aplicaciones como:
Tarjetas de control de accesoTarjetas de identificación de alta seguridadTarjeta de créditoPor tanto, las tarjetas de desarrollo son capaces de almacenar información y proteger datos mediante cifrado, siendo un recurso que combina funcionalidad y seguridad para diversas capacidades técnicas y aplicaciones.
Aprende más aqui:
https://brainly.com/question/10571894
A(n) ____________________ is a special character that can stand for any other character or, in some cases, a group of characters.
A design exhibits __________ when it uses newer styles in modern browsers while displaying a usable layout and all page content in older browsers.
Answer:
graceful degradation
Explanation:
Write the function prototype for a void function named getSquare. It should accept a pointer to an integer as an argument.
Answer:
void getSquare(int*);
Explanation:
The void is because it does not return a value.
Next is the name of the function "getSquare".
Then inside the ( ) you add the data types you want the function to accept, in this case its int*.
Finally you end with a ; because it is a function prototype.
When is it appropriate to restore from a system image?
Answer:
When should I use system image Recovery?
As long as you have created a system image of your hard disk, you can use the System Image Recovery tool from the Recovery Drive to restore your entire system in the event of a hard disk failure.
Explanation: