1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
2 years ago
8

Q2: Mark True or False in the corresponding Answer sheet (0.5 point each)

Computers and Technology
1 answer:
Zinaida [17]2 years ago
3 0

The answers to the question are:

  1. True
  2. True
  3. True
  4. True
  5. False
  6. true
  7. True
  8. True
  9. False
  10. False
  11. false
  12. False
  13. True
<h3>Which words are combined to form malware?</h3>

Malware is known to be a kind of malicious software and it covers  viruses, worms, trojans and other bad computer programs that is often used by hackers to wreak and steal information from system.

The types Of Expansion Cards are:

  • Sound Card
  • Graphics Card
  • Network Interface Card
  • Modem,

A sound card known as an audio card which is said to be an internal expansion card that helps to give input and output of audio message to and from a computer system.

Learn more about  sound card from

brainly.com/question/26964065

#SPJ1

You might be interested in
Make a hierarchical directory structure under /root that consists of one directory containing three subdirectories.
Alika [10]
You can make a hierarchical directory structure under /root that consists of one directory containing subdirectories  by using cd and mkdir
the mkdir command created the directories while the cd command changes which directory you're currently in
5 0
3 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
MoonieStardust Here is the rest of the picture from my last question you answered.
Oliga [24]

Answer:

the two on the bottom and the two on the top

Explanation:

move the two on the bottom apart and the two on the top inward

6 0
3 years ago
Read 2 more answers
How do you know when a spreadsheet object is active in a Word document?      A. The Ribbon is minimized. B. The Excel Formula ba
MaRussiya [10]
Y<span>ou will know when a spreadsheet object is active in a Word document </span>t<span>he Word icon in the taskbar is selected. The ribbon of Word will provide you with the Microsoft Excel features to be used for editing. These include charts, conditional formatting, and formulas.</span>
3 0
3 years ago
Read 2 more answers
Choose the comparison operator that will create a true statement in Scratch
andrew11 [14]

Answer:

The second option

90 > 85

The statement above means 90 is more than 85 which is true.

7 0
2 years ago
Other questions:
  • You would like to know how many cells contain data. Which function should you use? COUNT MIN SUM ABS
    14·1 answer
  • List and the deference between MS access objects​
    8·1 answer
  • Python program: Develop a program that will keep track of inventory for a local retail store. Fortunately, the store only offers
    7·2 answers
  • What type of backlighting receives dc power directly from a motherboard and doesn't use an inverter?
    11·1 answer
  • Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
    5·1 answer
  • Two strings, and , are called anagrams if they contain all the same characters in the same frequencies. For example, the anagram
    13·1 answer
  • Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
    14·1 answer
  • Explain<br> the three types of periodic<br>maintanance. .​
    10·1 answer
  • What is the key difference between a class and an object
    12·1 answer
  • As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!