1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
8

________ viruses are often transmitted by a flash drive left in a usb port.

Computers and Technology
1 answer:
valentina_108 [34]3 years ago
8 0
<span>Boot sector viruses are often transmitted by a flash drive left in a USB port.</span>
<span> This virus infects a storage device's master boot record (MBR).
</span>You can see that your computer is infected by this type of virus if:<span> data disappeared from entire partitions, the computer suddenly becomes unstable. or the computer fails to start up or to find the hard drive. </span>
You might be interested in
How do you measure the capacity of speed and memory of computer system<br>Explain.​
jeka94
Im sorry i just need points
3 0
3 years ago
Write a function to calculate the distance between two points Distance( x1, y1,x2.2) For example Distance(0.0,3.0, 4.0.0.0) shou
Ivenika [448]

Answer:

The function in Python3  is as follows

def Distance(x1, y1, x2, y2):

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

   return dist

   

Explanation:

This defines the function

def Distance(x1, y1, x2, y2):

This calculates distance

   dist = ((x1 - x2)**2 +(y1 - y2)**2)**0.5

This returns the calculated distance to the main method

   return dist

The results of the inputs is:

32, 32, 54, 12 \to 29.73

52,56,8,30 \to 51.11

44,94,44,39\to 55.00

19,51,91,7.5 \to 84.12

89,34,00,00 \to 95.27

4 0
3 years ago
Is it possible for two different passwords to ""unlock"" the same user account? Explain your answer.
tresset_1 [31]

Answer:

yes but only if you have a backup password

4 0
4 years ago
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash ca
weeeeeb [17]

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

5 0
3 years ago
Drag each tile to the correct box.
saw5 [17]

ISDN – improvement over dial-up; DSL – uses a higher frequency than a voice call; dial-up – makes your phone-line busy; cable internet – uses coaxial television cables; mobile internet – uses the cellular network are the different types of internet connection.

<h3>What is an internet connection?</h3>

The technology and systems of connectivity that allow a user to get access to the internet is known as an internet connection. There are different types of internet connection based on their technologies.

Hence, the different types of internet connection with their functionalities are mentioned above.

Learn more about internet connection here:

brainly.com/question/9380870

#SPJ1

7 0
2 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • ________-generation languages use symbols and commands to help programmers tell the computer what to do.
    11·2 answers
  • What’s the difference between the logical and physical structure of a file? What are the advantages of not having an application
    15·1 answer
  • TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
    12·2 answers
  • HI brainly friends....<br> Pease thanks my answers I will also thank your answers
    11·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
    12·1 answer
  • Can anyone please help?
    13·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • Pls say correct guyz pls pls pls
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!