1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
2 years ago
10

Can the charger of my laptop get infected with viruses also when it was connected to it?​

Computers and Technology
1 answer:
Ganezh [65]2 years ago
3 0

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

You might be interested in
6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
Brums [2.3K]

Answer:

Compare the predictions in terms of the predictors that were used, the magnitude of the difference between the two predictions, and the advantages and disadvantages of the two methods.

Our predictions for the two models were very simmilar. A difference of $32.78 (less than 1% of the total price of the car) is statistically insignificant in this case. Our binned model returned a whole number while the full model returned a more “accurate” price, but ultimately it is a wash. Both models had comparable accuracy, but the full regression seemed to be better trained. If we wanted to use the binned model I would suggest creating smaller bin ranges to prevent underfitting the model. However, when considering the the overall accuracy range and the car sale market both models would be

Explanation:

8 0
3 years ago
What is the output of the following code?
Lynna [10]

Answer:

The output is 24

Explanation:

Given

The above code segment

Required

The output

We have (on the first line):

x = 6

y = 3

z=24

result=0

On the second line:

result = 2*((z/(x-y))\%y+10)

Substitute the value of each variable

result = 2*((24/(6-3))\%3+10)

Solve the inner brackets

result = 2*((24/3)\%3+10)

result = 2*(8\%3+10)

8%3 implies that, the remainder when 8 is divided by 3.

The remainder is 2

So:

result = 2*(2+10)

result = 2*12

result = 24

<em>Hence, the output is 24</em>

8 0
2 years ago
To prevent class objects from being copied or assigned, you can:
Travka [436]

Answer:

The correct answer to the following question is option 4.

Explanation:

The private class does not mean that the package-private, it means that no other class can see its members.  

It is used in creating the building blocks which is implementing the internal functionality that you don't want to visible to the other projects using the library.

We can use private constructor to ensure that more than one object cannot be created at the time.

6 0
3 years ago
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
3 years ago
What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
Greeley [361]

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

  • In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.
  • In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.
  • In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

6 0
3 years ago
Other questions:
  • Which of the following terms means that the system changes based on
    14·1 answer
  • ________ are websites that provide collections of content from all over the world wide web a. aggregators b. social networks c.
    6·1 answer
  • What are the two ways that assets are
    5·1 answer
  • Which screen should be open to customize or personalize a desktop background?
    15·2 answers
  • Please solve the ones you can. Solving Both will be appreciated. thank you
    13·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • Please answer this question​
    8·1 answer
  • Identify a statement that accurately differentiates between short-term memory and working memory.
    15·1 answer
  • Bunco is a dice throwing game that requires no decisions to be made or skill on the part of the player just luck. In the simples
    7·1 answer
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!