1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
4 years ago
8

A _____ is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-

mail and other internet traffic.
Computers and Technology
1 answer:
SOVA2 [1]4 years ago
6 0
Trojan horse
....................
You might be interested in
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled liv
elena-14-01-66 [18.8K]

The correct answer is B. Check for sufficient available storage space.  

Explanation:

One of the factors that can cause it is not possible to install a new app is insufficient storage as space in the mobile device is needed to save the app. This can be easily solved either by deleting apps and other content or expanding the memory available through a Micro SD card. Also, before attempting any major procedure such as a complete reset it is important to check the storage space availability. In this context, the user should check for sufficient available storage space (option B) because this might be the cause of the issue she is experiencing; also, this is a basic step before considering others such as performing a factory reset.

6 0
3 years ago
In python how do you write for prime factors
olasank [31]

Answer:

The while loop is used and the factors of the integer are computed by using the modulus operator and checking if the remainder of the number divided by i is 0. 3. Then the factors of the integer are then again checked if the factor is prime or not.

Explanation:

google

4 0
3 years ago
How can one become a world scientist?
Lynna [10]
No need to woory abt age !!! In today's competitive grant world, this phenomenon is exacerbated. It is dangerous to one's funding to go against the trend, and if there is a lab to support and mouths to feed, the disincentives are great. This phenomenon stifles creativity, perhaps far more than biological age does. 
<span>While it is not frequently acknowledged either in the popular press or in scientific literature, a significant fraction of scientific discovery is the result of serendipity (or to put it more bluntly, luck). From the discovery of penicillin by Fleming to the discovery of new ionization techniques such as MALDI that power modern mass-spectrometry based proteomic research, luck has frequently played a big role. Such discoveries are generally attributed to hard work and genius, rather than to luck. Doing so gives the “genius” too much credit and luck too little.
</span><span>Risk taking is where most of the big discoveries in science lie. so takerisks.
</span>enjoy  always specially when you r  working and learn to say no
Learning to say “no” is particularly important for young faculty, who find themselves barraged with such requests, and who can easily get sucked into full-time committee duties. It is wise to step back frequently and ask, “overall, is this work I am doing fun?” If the answer is no, perhaps it is time to revisit and consider diving into a new area.
<span>Note the distinction in this guideline from: “learn to write and present well.”
</span><span>Understanding and conveying the big picture for one's work is perhaps the greatest challenge facing young scientists
</span>That's all I can give.
8 0
3 years ago
Read 2 more answers
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
monitta

Answer:

Page view and outline view available in "View" Tab.

Explanation:

<u>Page View:</u>

<u>There are four types of page views available in word.</u>

<u>1. Normal: </u>(Useful  when we need to write more text in word)

<u>2. Web layout: </u>(Use only when we are creating a website)

<u>3. Print layout: </u>(It is used to show the left, right, top and bottom margin for printing)

<u>4. Outline View:</u> (Used to make outline of whole document)

5 0
4 years ago
Other questions:
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    11·2 answers
  • Which of these is a good guideline when using text on a slide?
    13·1 answer
  • A neologism is defined as:
    5·1 answer
  • How are appointments scheduled in medisoft
    12·1 answer
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio
    11·1 answer
  • Explain the process of a for loop and how it is used in code
    9·1 answer
  • Which statement about broadcasting a slideshow online is true?
    14·2 answers
  • Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!