1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
8

Which of the following is a malicious program that can replicate and spread from computer to computer?

Computers and Technology
2 answers:
netineya [11]3 years ago
6 0
<span>Virus is the answer.
have any other questions that are in middle school, let me know.</span>
Fed [463]3 years ago
6 0
I believe the answer is Virus. 
You might be interested in
The computer mouse are used for
IgorC [24]
A computer mouse is an input device for a computer that provides information onto the x and y coordinates of the icon being moved around by this mouse (referred to as a cursor) based off of the hand movements of the user moving the mouse.
Mouses also have three other button inputs. These are the left, right, and middle mouse buttons. The left button is typically used as the primary button, and is used to select, drag, open, and similar function. The right mouse button is usually intended for opening menus for additional options to be performed by the program being right-clicked on. The middle mouse button is actually a wheel that is used to move pages that extend beyond the boundaries of your screen up and down for easier viewing.
Hope that helped! =)
5 0
3 years ago
Read 2 more answers
In which of the following ways can using test-taking tips help you?
bogdanovich [222]
In my opinion i think it is A
3 0
3 years ago
A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
vagabundo [1.1K]

Answer:

Offset bits: 3-bits

Set number of cache: 12-bits

Tag bits: 7-bits

22-bit physical address

Explanation:

Since the system is 32K so,

=2⁵.2¹⁰

=2¹⁵

As we know that it is 8-way set associative so,

=2¹⁵/2³

=2¹⁵⁻³

=2¹²

2¹² are cache blocks

22-bit physical address

Off-set bits are 3 as they are calulated from 8-way set associative information.

Set number of cache : 12-bits

For tag-bits:

Add off-set bits and cache bits and subtract from the total bits of physical address.

=22 - (12+3)

=22 - 15

=7

3 0
3 years ago
Scenes that are shot outside are known as
Maru [420]

Answer:

Location shooting

Explanation:

Most films feature a combination of locations and studio shoots; often‚ interior scenes will be shot on a soundstage while exterior scenes will be shot on location second unit photographs is not considered a location shoot. before filming the location are generally surveyed in pre-production‚

a process known as location scouting and recce.

3 0
3 years ago
What task can a user accomplish by customizing theme colors?
Stolb23 [73]

Answer:

D

Explanation:

I took the test

3 0
3 years ago
Read 2 more answers
Other questions:
  • Where do scanned documents go in windows 10?
    11·1 answer
  • Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, i
    9·1 answer
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • An anagram is a word or a phrase made by transposing the letters of another word or phrase; for example, "parliament" is an anag
    7·1 answer
  • Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
    12·1 answer
  • Please help, Tech class!!
    14·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
    7·1 answer
  • What is the main advantage of using DHCP?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!