What are the top 10 most dangerous computer viruses ?

Answers

Answer 1

Answer:

MydoomSobigKlezILOVEYOUWannaCryZeusCode RedSlammerCryptoLockerSasser

Explanation:


Related Questions

define a pseudocode algorithm that will efficiently play the guessing game.

Answers

Answer:

In computer science, pseudocode is a plain language description of the steps in an algorithm or another system. Pseudocode often uses structural conventions of a normal programming language, but is intended for human reading rather than machine reading.

Explanation:

Wasif would like to add some flair to text on a slide in his presentation. Which option can he use to create more dynamic graphics for his text?

*it's WordArt

Answers

Answer:

b. WordArt

Explanation:correct. post protected

what is one example of the use of an infrared sensor?

Answers

Infrared sensors are used in motion detection, night vision, astronomy, art restoration, gas detection, and a variety of other applications.

Explanation:

Televisions, for example, use an infrared detector to interpret the signals sent from a remote control. Passive Infrared sensors are used for motion detection systems, and LDR sensors are used for outdoor lighting systems.

switch to the view where you can see live data while modifying the report layout

Answers

To view the live or real data while modifying the layout of a report, the appropriate view to select is the Layout view.

Home tab --> View Group ---> click view --> Layout view

The Layout view allows modification of the page or document with the exact or real data as it is more visually oriented than the design view.

In the design view, the structure of the report can be modified or restructured without viewing the real data.

Hence, the appropriate view mode will be the a layout view.

Learn more : https://brainly.com/question/25651624

You have defined your player data type.class player:life = 3magic = Falsename = ''You created an instance of your player data type and assigned values.myPlayer = player()myPlayer.life = myPlayer.life - 1myPlayer.magic = TruemyPlayer.life = 4myPlayer.name = 'Kris'What will be the value displayed after this line of code?print(myPlayer.life)

Answers

Answer:4

Explanation:

describe any three difficulties a company may face in running a business without having computer network

Answers

1- Loss of data, 2- more time will consume, 3- don’t know the lastra news, hope this helps

A(n) ________ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

Answers

Answer:

app

Explanation:

An app store allows users to download apps. It can be in the form of a website or an app.

An app store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

What is app store?

App stores are primarily online storefronts where buyers can browse through the many categories of apps, view information about each app including reviews or ratings, and download the app including app purchase, if necessary – many apps are offered at no cost.

For more than 10 years, finding and downloading apps has been made safe and dependable by the App Store. But the App Store is more than just a store; it's a modern destination committed to giving you life-changing experiences.

The Apple Store App essentially serves as a mechanism for in-app purchases of Apple products rather than online ones. Your programs would be downloaded from the app store.

Thus, it is app store.

For more details about app store, click here:

https://brainly.com/question/2814429

#SPJ2

The ______ is a far-flung network of computers, while the ______ is a system for the distribution and retrieval of electronic information.

Answers

A far-flung (widely distributed) network of computers is referred to as the Internet, while the world wide web (WWW) is a system that is designed and developed for the timely distribution and retrieval of electronic information.

The Internet is simply an abbreviation for interconnected network and it refers to a far-flung (widely distributed) network of connected computer systems that facilitates the following activities, through the use of the Transmission Control Protocol/Internet Protocol (TCP/IP):

Worldwide communication.The dissemination of information.The swift access to data resources and multiple databases.

On the other hand, the world wide web (WWW) is a system that is designed and developed for the timely distribution and retrieval of electronic information.

Additionally, the world wide web (WWW) was invented in 1990 by Sir Tim Berners-Lee while he was working with the European Council for Nuclear Research (CERN).

Read more: https://brainly.com/question/21140502

What is the place value position of the 7 in the number below?

1,376

A ones) b tens) c hundreds) d thousands)

Answers

Tens hope that helps
The answer is b tens

A( n ) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database.

Answers

Answer:

Here's your answer DBMS or (database management system)

To insert slides from a Word outline, click the arrow below the _______ button and select the Slides from Outline option.

Answers

The computer consist of a lot of functions that are used in carrying out task. To put slides from a Word outline, click the arrow below the New Slide  and select the Slides from Outline option.

A slide is known as the single page of a presentation. A group of slides is commonly called a slide deck.

In this digital age, a slide is known as any single page created using a presentation program

To put slides from a Word outline,  first of all, you open PowerPoint, and select Home . Then you click on New Slide, click on Select Slides from Outline. In the put Outline dialog box, find and select your Word outline.

Learn more from

https://brainly.com/question/12060856

How do you make an organizational chart in PowerPoint?

Answers

On the Insert tab, in the Illustrations group, click SmartArt. In the Choose a SmartArt Graphic gallery, click Hierarchy, click an organization chart layout (such as Organization Chart), and then click OK

__________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.

Answers

Business Intelligence or data analysis refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.

Business intelligence (BI) is a data analysis is used by organizations to analyze data and hence gain insights on overall business performance so as to help the organization make good business decisions.

It helps organizations to increase revenue and efficiency thereby being more competitive than other business organizations.

Find out more at: https://brainly.com/question/15406226

Amelia has two presentations open and wants to view them at the same time. She can click the _____ button on the View tab.

Answers

Or she can do alt+tab

Amelia has to presentation open and can do work on them at the same time by use of the alt+tab view tab.

What is a presentation?

A presentation is a  Microsoft office software issued for presenting the top to the audience and masses. It can be informative, structured and brief. The presentation can be persuasive and decision-making.

The presenter needs to keep track of time and hence need to open two presentations the can do this by making use of the view tab that is alt+tab.

Find out more information about the presentations.

brainly.com/question/9624547

The university has a requirement that students must be allowed to view course offerings and register for classes that have empty seats. What type of requirement is this

Answers

Considering the situation described above, the type of requirement here is known as Functional requirement.

What is Functional Requirement?

A functional requirement is a term that is often used in software engineering to describe the function of a specific system or essential parts of it.

How is Functional Requirement applies here?

Given that students are allowed to view course offerings and register for classes that have empty seats, this implies that the empty classes serve the function of occupying or accommodating students for courses; this is am an example of a functional requirement.

Other types of requirements are the following:

Performance RequirementsSystem Technical RequirementsSpecifications

Hence, in this case, it is concluded that the correct answer is "Functional requirement."

Learn more about Functional requirements here: https://brainly.com/question/20378439

will my alarm go off if my phone is on do not disturb

Answers

yes,because the do not disturb is like for messages if you don’t want notifications from messages and apps.

please help me will give brainliest

Answers

Answer:

The person may be a farmer market person or a marketer.

Looks like they are keeping track of how many of each item that they have sold or how many of each item they have.

echnician A says that UHSS is designed to absorb collision energy.

Technician B says that mild steel is designed to transfer collision energy.

Who is right?


A only

B only

Both A and B

Neither A nor B

Answers

Isbsbakajs Alana a sa

What term is used to describe the process of monitoring operating results and comparing actual results with the expected results

Answers

Answer:

controlling

Explanation:

hope this helps

what is the next number in the pattern 12, 18, 24, 30, 36,

Answers

It would be 42 because you keep on adding 6

Which of the following should be considered when implementing a DMZ?

A DMZ can only monitor a web server.
A DMZ has no power after a network has been penetrated.
A DMZ can be used to monitor only internal traffic.
A DMZ can only monitor one computer at a time.

Answers

A DMZ (de-militarized zone) is a segmented network that discriminates between an organization's internal infrastructure and its externally connected units, such as the Internet.

If decided to implement a DMZ, certain conditions must be considered including:

Type of servers placed in the zone, i.e. web or email servers;

The strategical structuring and layout of the network, considering that it must include properly placed firewalls and other security hardware;

The degree of external user access required to both the interior network and the surrounding area of the DMZ;

Security policies and practices adopted to manage and vigilantly observe the DMZ;

The necessity for redundant provisions and failover ways to guarantee the continuous operation of sizable systems within the region of the DMZ.

Contrary to popular belief, a DMZ does not simply oversee one single computer or even just a web server.

Furthermore, DMZs are not unavoidably exempt from assaults, but they can prove to guarantee pivotal optimality and provide added layers of security to protect essential devices and data.

Read more about DMZ here:

https://brainly.com/question/23318736

#SPJ1

_____ have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Answers

Digital natives have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Digital natives simply refer to the people who have grown up under the influence of the internet and other information technologies.

A digital native refers to someone that's raised in a digital world. Such a person is in close contact with the internet, video games consoles, computers, etc. The term is usually associated with millennials.

In conclusion, the correct option is digital natives.

Read related link on:

https://brainly.com/question/25393713

What is the easiest way to get great answers?

Answers

If you listen to the teachers in class and take notes, then your answers should be some of the best! My advice is to take notes and pay close attention. If you sit by friends in class that make you talk during the lesson, then ask the teacher to move desks. Hope this helps!!!

Fletcher is making an online ticket buying system for a museum. His program needs to calculate the final cost of a ticket with extra options added, a planetarium show and an IMAX 3D movie. The initial code looks like this:

Answers

The final ticket cost obtained by taking the sum of ticket price and the extra options can be obtained thus ;

finalCost = ticket + imax3D + starShow

Using Python 3 :

ticket = int(input("Enter ticket cost :"))

#takes input for ticket cost

imax_cost = int(input("Enter imax3D cost :"))

#takes cost of imax3D

starshow_cost = int(input("Enter cost of starShow :"))

#takes input for cost of starShow

finalcost = ticket + imax_cost + starshow_cost

#takes the sum of the cost and assign to the finalcost variable

Learn more : https://brainly.com/question/25553386

why do we need patch panel and modular box?​

Answers

More adaptability. If you need to alter something or something breaks, patch panels allow you flexibility and eliminate the need to re-run cables or transfer equipment locations.

Hope it helps:)

When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called

Answers

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

The process When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

What is the Lightweight Directory Access Protocol?

An open, supplier conditioning and reinforcement for providing distributed directories technology solutions over an IP network are called the Lightweight Directory Access Protocol.

By enabling the sharing of data about people, systems, networks, services, and applications throughout the network, directory services play a crucial role in the development of intranet and Internet applications.

LDAP is frequently used to offer a central location to store users and passwords. As a result, several software programs and services can connect to the LDAP server to verify users.

The interaction When LDAP traffic is made secure by utilizing a Secure Attachments Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

More about the Lightweight Directory Access Protocol link is given below.

https://brainly.com/question/28364755

#SPJ12

importance of primary key ?​

Answers

Answer:

Using the primary key, you can easily identify and find unique rows in the database table. They allow you to update/delete only specific records by uniquely identifying them. The table's data is sorted based on the primary key. They help you avoid inserting duplicate records in a table.

Programming that relies on the use of objects and methods to control complexity and solve problems is known as what type of programming

Answers

Answer:

Object-based programming

Explanation:

Another alternative more commonly used is Object Oriented Programming (OOP)

How do computers hold integers greater than 255?​

Answers

Answer:

It depends on the number of bits you use. In your example, you've used an 8 bit (one byte) number, which does max out at 255. Ever since forever, computers have used numbers that are larger than one byte. For when that isn't enough, Fortran includes the 'double precision' numbers which use 8 bytes.

Explanation:

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

Answers

Network  Standards  help us to access a network, control  data transmission, and evaluate hardware devices across systems.

Networks standards  are built to direct the rules in data communications for the devises of hardware and  corresponding software  for prompt and efficient  interoperability between them.

Some official organizations responsible for regulating  standards are:

International Standards Organization (ISO) International Telecommunication Union (ITU) Institute of Electronics and Electrical Engineers (IEEE) American National Standards Institute (ANSI) Internet Research Task Force (IETF) Electronic Industries Association (EIA)

Different standards can be used during data communication at the same time on  different layers, Some  commonly used  ones includes:

Application layer − HTTP, HTML, POP, H.323, IMAP Transport layer − TCP, SPX

See more here:https://brainly.com/question/17316634

Other Questions
Which of the following is not related to the cell cycle?Cell divisionCell divisionOrganism grothOrganism grothDNA replicationDNA replicationReproduction Make predictions about how changing the mass or speed of an object will change the object's kinetic energy. Help, please science btw Why is Christianity considered a religion?A. Because it is a system of beliefsB. Because it has a large number of followersC. Because it has been around for a number of years D. Because it is important to the government a farm has almond trees and walnut trees. the number of almond trees is 2 third of the number of walnut trees. there are almost 120 almond trees.how many walnut trees are there Solve for x: 1/9 x what = 2 1/8 Translate the sentence into an equation.Three less than the product of 2 and a number is equal to 6.Use the variable x for the unknown number. I need helpl i dont understand why is israel occupying the palestinian territories 6a+3a+8b+a5b3b+6a3 b plus 6 A3b+9a3 b plus 9 A3b+10a3 b plus 10 A13b+9aASAP PLEASE Which two structures are not present in animal cells? 1. Cell Wall and Nucleus 2. Golgi Apparatus and Mitochondria 3.Cell Wall and Chloroplast 4. Endoplasmic Reticulum and Cytoplasm Typing in red ___________________. Graph the line:Y = -4x + 6 A student was marked tardy five different times in a 40 day period. What percent of the time was the student tardy? 127343895+834823= bao nhiu When speaking on behalf of your team in a routine message, you might seek ______ from other team members to make sure they agree with what the message says. the rectangle with a side of length 12cm has a diagonal of 15cm. what is the perimeter of the rectangle? which math expression means "45 less than an unknown number"? A. x- 45B. x + 45C. 45 xD. x * 45 Queremos preparar 250 cm3 de disolucin de sal en agua, con una concentracin de 5 g/l. Qu cantidad de sal debemos disolver en agua? You find out a coworker is expecting a baby. However, you recently discovered that your coworker, who has been a heavy smoker in the past, has not stopped. Using the knowledge you have about the effects of teratogens during pregnancy, what is likely to happen if she continues to smoke while pregnant A local bicycle shop makes $75 on eachModel A bike and $90 on each Model B bike.The overhead costs for making the bikes are$1,350. Write an inequality to show howmany of each bike model must be sold so thecompany avoids losing money.