1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
2 years ago
10

Can the charger of my laptop get infected with viruses also when it was connected to it?​

Computers and Technology
1 answer:
Ganezh [65]2 years ago
3 0

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

You might be interested in
What happens when the computer is thrashing? quizzlet?
lutik1710 [3]
When computers need to use more memory than have RAM, they'll swap out pages of memory to their drive. When they need those memory pages, they'll swap out others and swap in the needed ones. If a computer needs enough additionall memory, it can get so busy swapping that it doesn't have any (or very little) time to do any useful work. That is called thrashing.

Unix calls swapping swapping. Windows calls it paging, probably because of the memory pages. Memory pages are 4096 (4KB) sections of memory.

Unix drives are usually partitioned with a swap partition, and swap files can be made in the filesystem. Windows just has pagefiles[s].
5 0
4 years ago
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
Select the correct answer.
ss7ja [257]
The answer a identifying portfolio goal
8 0
3 years ago
Read 2 more answers
Explain the two filter options available when filtering by a column
dexar [7]
Can you prove more information?
8 0
3 years ago
Read 2 more answers
Other questions:
  • Workspace How do the following technologies help you in your quest to become a digital citizen: kiosks, enterprise computing, na
    6·1 answer
  • 20 Points!! Please hurry!!
    9·1 answer
  • Someone who participates online for social reasons usually has a:
    9·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Find the number of times a value appears in a list, and create a new list that contains the index positions where the value occu
    6·1 answer
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • Write a program called array1.cpp file that use either regular for loop or range based for loop to display the contents of the a
    14·1 answer
  • HELP ME PLEASEEEE
    8·1 answer
  • Which line of code will find the first occurrence of a three in an array?
    5·2 answers
  • You defined a class and saved it as shoe.py.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!