1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
2 years ago
9

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Computers and Technology
1 answer:
telo118 [61]2 years ago
3 0

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

You might be interested in
What is the output of the second println statement in the main method, public class foo { int i ; static int s ; public sttic vo
Sedaia [141]

Answer:

b) f2.i is 1 f2.s is 2

Explanation:

i is an instance variable and s is static, shared by all objects of the Foo class.

6 0
3 years ago
Which statement best describes a scientific theory?
lisov135 [29]

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

6 0
3 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
3 years ago
1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
NeX [460]

Answer:

helthcare systems, aviation, entertainment, retail, etc

Explanation:

ICT has made life easy, it has made an interconection accross the world. in the helthcare system, ICT has created a positive impact because now a days body check up is been made through computers.

in the aviation, we use computers to control the the traffic of airplanes.

5 0
3 years ago
Which of the following is used by credit card companies to determine APR?
kodGreya [7K]
Prime rate + credit history (APEX)
4 0
3 years ago
Read 2 more answers
Other questions:
  • He would like to get rid of the graph. What will accomplish
    8·1 answer
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • When a Firewall is a hardware interface, it is referred as a
    6·1 answer
  • Develop a Python program. Define a class in Python and use it to create an object and display its components. Define a Student c
    11·1 answer
  • What's the average value of an ac voltage that has a maximum Peak voltage of 80 VAC
    13·1 answer
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
  • Helppppppppppp please
    5·2 answers
  • The most important part of a computer​
    14·2 answers
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
  • 7.2.4 Area of Triangle HELP PLEASE!! (JAVA SCRIPT) I WILL WAIT FOR THE SOLUTION.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!