1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
11

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer w

orks without the userâs knowledge or permission.
Computers and Technology
1 answer:
Leviafan [203]3 years ago
5 0
Virus










-----------------------------------
You might be interested in
What is data and instructions entered into the memory of a device
lyudmila [28]

A POINTING DEVICE IS AN INPUT DEVICE THAT ALLOWS A USER TO CONTROL A POINTER ON THE SCREEN. ... A KEYBOARD IS AN INPUT DEVICE THAT CONTAINS KEYS USER TO ENTER DATA AND INSTRUCTIONS INTO A COMPUTER.                                                                            

SORRY FOR CAPS MY CAPS KEY GOT STUCK

3 0
4 years ago
What benefits did evolution realize by using the crm software?
Elza [17]
Hello there!
Answer:
Have included productivity improvements (doubling the number of deliveries for a speci²c time period), enhanced inventory management, automation of picklists, better resource planning, and more e±ective reporting to key stakeholders. Evolution’s CRM system can determine deliveries planned for any future month and the amount of product in stock, helping Evolution reduce stock holding by 40%. When a new patient is keyed onto system, tasks can be generated for Evolution’s team to organize delivery ahead of time. The system automatically generates a pick list for that patient from Evolution’s pharmacy. Managers can see tasks 2 weeks ahead and can allocate resources accordingly. Hoping this helps you! :D
4 0
3 years ago
How do you level up on this thing?
Gala2k [10]
You just have to answer a lot of questions, and get voted "Brainliest" by the person who posts the question
6 0
3 years ago
Based on the naming recommendations in the book, which of the following is a good identifier for a variable that will be used to
Mazyrski [523]

Answer:

A good identifier for a variable that will be used to hold an employee’s phone number is:

a. EmployeePhoneNumber

Explanation:

An identifier is a string that uniquely identifies or names the entity or an object.  The object or entity may be a constant, variable, structure, function, etc. Identifiers can be formed from uppercase and lowercase letters, digits, and underscores.  Meaningful identifiers mostly favor the use of long descriptive names like EmployeePhoneNumber.  However, the other options can still be used.

7 0
3 years ago
I'm not sure if these are correct.
Basile [38]

Answer:

All the mention codes are correct.

Explanation:  

In the task1, a "name" variable is declared, that store a string, and in the next step, the built-in method "title, lower and upper" is defined, in which the title method capitalized the first character of the given word in each sentence, upper method change each character into upper case and the lower method changes each character into lower case.

In task2, a message variable is declared, that holds a string value in which the count method is used that counts the space character value.

In task3, a string value is used in the message variable, which uses a replace method to change the given string value.

In task3, a response variable is declared that uses an input method for input a string value, and inside the print method, len method is used that counts each input character number.

3 0
3 years ago
Other questions:
  • The ________ is(are) used to display information on the computer's screen.
    13·1 answer
  • Which statements are true about making formatting changes to cells in Excel? (Select all that apply)
    11·1 answer
  • python If the checksum is 10, the last digit is denoted as X according to the ISBN-10 convention. Write a program that prompts t
    10·1 answer
  • Maisy is an aspiring video game programmer. She has some unique ideas for new video games, but first, she needs to get some comp
    8·1 answer
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
    9·1 answer
  • A special case of the non-inverting amplifier is when
    12·1 answer
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • What is SEO and SEM?
    10·1 answer
  • HELP PLEASE!!!! Which development method is best explained in this way: developing a system through repeated cycles and smaller
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!