1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
8

Which of the following is a malicious program that can replicate and spread from computer to computer?

Computers and Technology
2 answers:
netineya [11]3 years ago
6 0
<span>Virus is the answer.
have any other questions that are in middle school, let me know.</span>
Fed [463]3 years ago
6 0
I believe the answer is Virus. 
You might be interested in
WILL GIVE BRAINLEIST PLZ HELP PLZ AND THANK YOU
Anna35 [415]

Answer:

SIR I AM A BRAINLT MODERRATER U CAN NOT POST THINGS LIKE THIS  I LOOKED THIS UP AND ITS A TEST

Explanation:

3 0
3 years ago
How do i know my child's login info for parent infinite campus
Oliga [24]

Answer:

Logging in from a Web Browser

Visit infinitecampus.com and click Login at the top right.

Search for your District Name and State. Select your district from the list.

Click Parent/Student.

Click either Campus Parent or Campus Student.

Enter the Username and Password provided by your school. ...

Click Log In!

Explanation:

5 0
3 years ago
What is meant by saving a sheet document​
Zina [86]

Answer:

While you'll use Save or press Ctrl+S to save an existing workbook in its current location, you need to use Save As to save your workbook for the first time, in a different location, or to create a copy of your workbook in the same or another location.

5 0
3 years ago
Which ipsec subprotocol provides data encryption?
Mrac [35]
I'm not sure but I think LastPass?
6 0
4 years ago
What is the name for non-paid active links returned by an Internet search engine in the search results?
otez555 [7]

Answer:

organic links

Explanation:

7 0
3 years ago
Other questions:
  • Technology can help governments handle economic emergencies, such as the reliance on automation. Crop and resource shortages. Th
    15·2 answers
  • After running a Google Search Ads campaign for several months, Meredith notices sales of her advertised products are starting to
    8·1 answer
  • As an ICT student teacher using convincing and cogent reasons explain why you think operating system is pivotal in teaching and
    7·1 answer
  • Which type of word processing programs enables us to include illustrations within the program?
    6·1 answer
  • Over time, smart phones have become _____.
    12·2 answers
  • How do u reverse image search on Android? ​
    9·1 answer
  • If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic
    14·1 answer
  • 2.3 pseudocode exercise on edhesive
    9·1 answer
  • What is the type of data in the list [103, 405, 527, 396, 503]?
    7·2 answers
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!