1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
2 years ago
9

A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.

Computers and Technology
1 answer:
Dafna11 [192]2 years ago
5 0
Computer virus, a software program that is designed to cause damage to the computer system or perform some other
malicious act
You might be interested in
Write a method named countMatching(). It has two parameters: a String and a character. The method returns a count of how many ti
andreev551 [17]

Answer:

Check the explanation

Explanation:

public static int countMatching(String s, char c) {

   int count = 0;

   for (int i = 0; i < s.length(); i++) {

       if (s.charAt(i) == c)

           ++count;

   }

   return count;

}

Method in a complete Java program

public class FizzBuzz {

/* sample run:

    * z appears 2 time(s) in FIZZbuzz

    */

   public static void main(String[] args) {

       String s = "FIZZbuzz";

       char c = 'z';

       int count = countMatching(s, c);

       System.out.printf("%c appears %d time(s) in %s%n", c, count, s);

   }

   // Put your countMatching() method here:

   public static int countMatching(String s, char c) {

       int count = 0;

       for (int i = 0; i < s.length(); i++) {

           if (s.charAt(i) == c)

               ++count;

       }

       return count;

   }

}

z appears 2 time(s) in FIZZbuzz Process finished with exit code

4 0
4 years ago
good information is characterized by certain properties. List and explain these characteristics of good information​
Gelneren [198K]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
3 years ago
Write a method named printOdd() that accepts an integer array as argument and print all the odd numbers in the array. You may as
Hoochie [10]

Answer & Explanation:

//written in java

public class Main {

   private static void printOdd(int[] list) {

       for (int value : list) {

           if (value % 2 == 1) {

               System.out.println(value);

           }

       }

   }

   public static void main(String[] args) {

       printOdd(new int[]{5, 6, 2, 3, 11, 4, 7});

   }

}

8 0
4 years ago
Which would be the best and worst answer choices?
jeyben [28]

Answer:

option 3

Explanation:

4 0
3 years ago
As a technical project​ manager, you have decided to propose implementing a prototyping methodology for a small​ web-based desig
Arlecino [84]

Answer:

B: Use the prototype and revise and enhance the prototype.

Explanation:

Before going ahead to execute any project, one must define the requirements for the project. It is only after the requirements for the project is known that one can go ahead to develop the prototype, use the prototype, revise and then enhance the prototype.

4 0
4 years ago
Other questions:
  • Because all web browsers don't interpret html and css the same way, a major web development issue is
    13·1 answer
  • What's the first step in being a wise consumer of media?
    10·2 answers
  • 12.
    10·1 answer
  • Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
    12·1 answer
  • You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
    5·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • Unlike oracle, access does not support the decimal data type.​<br><br> a. true<br><br> b. false
    9·1 answer
  • _____ selectors are used to select elements based on elements that are adjacent to them in the document hierarchy.
    9·1 answer
  • What is output if the user enters -5?
    12·2 answers
  • 18. which of these components is responsible for providing instructions and processing for a computer? a. cpu b. ssd c. ram d. r
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!