1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
1 year ago
10

Can the charger of my laptop get infected with viruses also when it was connected to it?​

Computers and Technology
1 answer:
Ganezh [65]1 year ago
3 0

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

You might be interested in
Rebooting the computer is a good troubleshooting technique.<br><br> True<br> False
Basile [38]
True it could help.....
6 0
3 years ago
Read 2 more answers
Should a UDP packet header contain both Sour Port # and Destination Port #?
densk [106]

Yes, a UDP packet header should contain both Sour Port # and Destination Port #.

<h3>Which fields are included in a UDP header?</h3>

The fields that one can see in a UDP header are:

<h3> Source port :</h3>

This is known to be the port of the device that is known to be sending the data. This field is one that a person can set to zero only if the destination computer do not require one to reply to the sender.

<h3> Destination port :</h3>

This is known to be the port of the device that is said to be getting or  receiving the data.

Hence, to the answer above, my response is Yes, a UDP packet header should contain both Sour Port # and Destination Port #.

Learn more about UDP packet from

brainly.com/question/10748175

#SPJ1

4 0
2 years ago
In your opinion is it more beneficial to have many folders or is it better to nest subfolders
Semmy [17]
I dont think it matters just as long you have all your things to work it doesnt matter if you have to tape it on your back
7 0
3 years ago
What is the preferred procedure for putting customers on hold​
vesna_86 [32]

Answer/Explanation:

Explain the reason you need to put the caller on hold.

Ask for the person's phone number, in case the conversation is cut off.

Promise to return in a minute—or your best estimate of how long the hold will last. If you think the delay will be longer than a couple of minutes, ask for a number and a time when you can call back.

If, despite your best efforts, the delay is taking longer than anticipated, check in with the caller so that he doesn't feel abandoned. Again, offer to call back, "rather than keep you holding."

When you return to the phone, apologize for the inconvenience and thank the caller for his patience.

Use the caller's name frequently to add a sense of connection.

The first step you can take when putting a caller on hold and making it a satisfying experience is a systematic one. When a caller is on hold, 60 seconds seems like an eternity, so see if you can program the phone system to play music (calming classical or jaunty jazz is best) to break this perception of an interminable wait. Aside from that, however, putting someone on hold in a professional way depends on your behavior. The golden rule to keep in mind is as follows: how would you like to be treated if you were on the other end of the line?

MAKE ME THE BRAINLIEST!!!!!!!!!!!!

8 0
3 years ago
Read 2 more answers
Which statement describes borders and shading ?
Marina CMI [18]

Answer: Borders are rules you can add to any or all of the four sides of a paragraph. Shading is the color or artistic design you use as background for a paragraph. Borders and shading are formatting tools for enhancing text, paragraphs, table cells or frames.

3 0
3 years ago
Other questions:
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • Python: Write a program that generates 8 random scores (between 0 and 100), store them in an array,
    8·1 answer
  • Write an algorithm in pseudocode (following the style of the Minimax pseudocode) that will always make an optimal decision given
    13·1 answer
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • What is the role of science and technology in achieving human’s ultimate goal or the good life?
    8·2 answers
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbe
    8·1 answer
  • How was WiFi discovered?
    8·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
  • Which response best completes the following IF-ELSE statement?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!