1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
9

Which of these can expose a computer to a virus? Check all that apply.

Computers and Technology
2 answers:
Anestetic [448]3 years ago
6 0
I think it’s websites
Rina8888 [55]3 years ago
4 0

Answer:

downloads, websites, emails?

You might be interested in
Privacy settings allow account owners to decide who can ........
schepotkina [342]
Have access to your phone info
4 0
3 years ago
Read 2 more answers
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
4 years ago
Service Level Agreements are considered the most comprehensive way to fully measure service desk performance. TRUEOR FALSE
icang [17]
Since a service level agreement is between the service provider and the client I would say yes. The feedback for products or services can help the company to ensure that they are selling to the max quality of the products.
3 0
4 years ago
Write a program that takes three numbers as input from the user, and prints the largest.
nasty-shy [4]

Answer:

Written in Python:

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

num3 = int(input("Enter a number: "))

if(num1 >= num3 and num1 >= num2):

    print("Largest: "+str(num1))

elif(num2 >= num3 and num2 >= num1):

    print("Largest: "+str(num2))

else:

    print("Largest: "+str(num3))

Explanation:

The next three lines prompt user for input of three numbers

<em>num1 = int(input("Enter a number: "))</em>

<em>num2 = int(input("Enter a number: "))</em>

<em>num3 = int(input("Enter a number: "))</em>

This following if condition checks if num1 is the largest

<em>if(num1 >= num3 and num1 >= num2):</em>

<em>     print("Largest: "+str(num1))</em>

This following if condition checks if num2 is the largest

<em>elif(num2 >= num3 and num2 >= num1):</em>

<em>     print("Largest: "+str(num2))</em>

The last condition assumes num3 is the largest if the previous conditions are false

<em>else:</em>

<em>     print("Largest: "+str(num3))</em>

<em></em>

6 0
3 years ago
Objects have methods and properties. what are methods and properties?
son4ous [18]

Methods are bits of code, which can be executed. They define the behaviour of the object. Properties are bits of data, contained within the object, they define the state of the object.

3 0
3 years ago
Other questions:
  • Why is it more important now than ever before to know how to evaluate websites and other online sources of information?
    7·1 answer
  • With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
    6·1 answer
  • Write a function called getChar that has no function inputs, but takes in two character inputs from the user (in1 and in2) and o
    6·1 answer
  • What is input process<br>​
    14·1 answer
  • Which of the following is the most important system if a company wants to consolidate fan data from multiple sources, i.e., exte
    11·2 answers
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?
    5·1 answer
  • What is CPU ????....................​
    7·2 answers
  • PLEASE HELP ASAP
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!