1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
1 year ago
9

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Computers and Technology
1 answer:
telo118 [61]1 year ago
3 0

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

You might be interested in
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demil
ella [17]

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

7 0
3 years ago
What is another name for a blue screen error which occurs when processes running in kernel mode encouter a problem and windows m
Sonbull [250]
Another name for a blue screen error is Blue screen of death
7 0
3 years ago
A computer has a pipeline with four stages. each stage takes the same time to do its work, namely, 1 nsec. how many instructions
prisoha [69]

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement

Further explanation:

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement, where the yield of one component is the contribution of the following one. The components of a pipeline are frequently executed in parallel or in time-cut style.

Instruction travelling:

999,999,997 guidelines for each second. The pipeline has 3 nsec of straightforward figurings, at that point finishes a guidance in each ensuing nsec.  

3nsec (for first guidance to go down the pipeline).10^9 ns every second. 10^9 – 3 = 999999997 directions.

Instruction per second:

MIPS - Million guidelines for each second  

Million guidelines for each second (MIPS) is a more established, outdated proportion of a PC's speed and power, MIPS measures generally the quantity of machine directions that a PC can execute in one second.

Per second:

Million directions for each second (MIPS) is a more established, old proportion of a PC's speed and power, MIPS measures generally the quantity of machine guidelines that a PC can execute in one second. Be that as it may, various directions require pretty much time than others, and there is no standard strategy for estimating MIPS. Moreover, MIPS alludes just to the CPU speed, while genuine applications are commonly constrained by different elements, for example, I/O speed

Answer Details:

Subject: Computer and technology

Level: College.

Key Words:

Further explanation:

Per second:

Instruction per second:

Instruction travelling:

For further Evaluation:

brainly.com/question/6362387

brainly.com/question/12938965

6 0
3 years ago
Read 2 more answers
Which step in the software development life cycle involves making improvements based on user feedback?
BigorU [14]

Answer:

Design Phase

Explanation:

In design phase developers make prototypes. The prototype is the solution without actual implementation. That prototype is shown to the user for the purpose of getting feedback. So design phase of SDLC involves making improvements based on user feedback.

3 0
3 years ago
Read 2 more answers
The research department of Mark ‘2’ Limited in a recent stakeholder meeting argued that socially responsible businesses win the
Mama L [17]

The organization’s social responsibilities to its key stakeholders, the environment, and the community are:

  • The issue of Organizational governance.
  • The issue of Human rights.
  • The issue of Labor practices.
  • The issue of Environment.
  • The issue of Fair operating practices.
  • The issue of  Consumer issues.

<h3>What is an organization's social responsibilities to the environment and the community?</h3>

Social responsibility is known to be a term that is often used  in businesses, and it is often used in line with the maximizing of shareholder value.

Note that this is one that entails that firms should act in a manner that is said to often benefits society. Socially responsible companies should use policies that tend to boast or promote the well-being of society and that of the environment.

Therefore, The organization’s social responsibilities to its key stakeholders, the environment, and the community are:

  • The issue of Organizational governance.
  • The issue of Human rights.
  • The issue of Labor practices.
  • The issue of Environment.
  • The issue of Fair operating practices.
  • The issue of  Consumer issues.

Learn more about social responsibilities from

brainly.com/question/12951431

#SPJ1

7 0
1 year ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Write an expression whose value is a String consis
    13·1 answer
  • When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and
    12·1 answer
  • When you ask the database more complex questions using comparison operators, you are conducting a _____. sort questionnaire quer
    7·1 answer
  • What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
    12·2 answers
  • What is another term for accountability?
    7·2 answers
  • What is the interface in Java programming Language? Why do we need to use it?
    6·1 answer
  • Match the item to the type.
    11·1 answer
  • Which is the highest level of the hierarchy of needs model?
    14·1 answer
  • Ask how many apples the user wants. Ask how many people the user will share the apples with. Find out how many apples will remai
    7·1 answer
  • Explain why computer professionals are engaged in technical services
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!