1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
11

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer w

orks without the userâs knowledge or permission.
Computers and Technology
1 answer:
Leviafan [203]3 years ago
5 0
Virus










-----------------------------------
You might be interested in
Nog
STatiana [176]

Answer: False

Explanation:

The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.

The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.

8 0
3 years ago
A string that contains only 0s,1s, and 2s is called a ternary string. How many strings of 10 ternary digits (0, 1, or 2) are the
alexdok [17]

Answer:

Number of strings = (10, 2)×(8,3) = 2520

Explanation:

The number of possible combinations for taking two 0's is C(10, 2)

It remains 8 Positions

The number of possible combinations for taking three 1's is C(8,3)

So there remains 5 spots

8 0
3 years ago
Read 2 more answers
Which statement correctly explains why televisions became less bulky?
REY [17]

Answer:

The old cathode Ray tube technology was replaced by the less bulkier and more modern liquid crystal display and LED technology.

Explanation:

The old cathode ray tube uses the principle of electrical discharge in gas. Electrons moving through the gas, and deflected by magnetic fields, strike the screen, producing images and a small amount of X-rays. The tube required more space, and consumed more electricity, and was very bulky. The modern technologies are more compact and consume less power, and can been designed to be sleek and less bulky.

3 0
3 years ago
An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
matrenka [14]

Answer:D. A HIPAA violation

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a legislation that was designed to protect or safeguard medical records of patients, to eliminate and prevent healthcare fraud and protect health care coverage of employees .

It helps to ensure that patients' information remains private and their record are secured.

The updated rules of this act includes the HIPAA Privacy Rule, HIPAA Security Rule, HIPAA Omnibus Rule, and the HIPAA Breach Notification Rule.

A HIPAA violation is a failure to comply with any aspect of HIPAA standards and provisions and in this case it was theft of records; he should have ensured that the computer is placed in a secured place or the information is locked even when the computer get stolen.

7 0
3 years ago
If you are in a tornado situation which of the following should you NOT do?
Hunter-Best [27]
Three. A bridge can be put under immense pressure during a storm. In addition to that if a tornado has caused a storm surge the rising water could make you drown
5 0
3 years ago
Other questions:
  • What type of organizational structure would you want to use for this company (by function, by process, by product, and so on)? E
    11·1 answer
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • Project using simple formulas
    15·1 answer
  • I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces s
    7·2 answers
  • Please help me with question 1!
    8·2 answers
  • The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
    5·1 answer
  • What option for deploying software to users provides a link to install an application within Control Panel's Programs and Featur
    6·1 answer
  • Binary numbers are based on __________.
    12·2 answers
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!