1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
6

A viral video is one that can infect your computer with malware. a. True b. False

Computers and Technology
1 answer:
Alona [7]3 years ago
4 0
False. A viral video is one exposed to many views from different devices in a short amount a time, this becoming viral. Nothing to do with viruses
You might be interested in
1.a computer can create an output based on the input of the user.
densk [106]

Answer:

But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.

6 0
3 years ago
Why is it important to use proper line types
AnnZ [28]
Because then the line is proper as opposed to if the line is improper. If the line is improper, then it has no manners and you can't invite it to dinner with your family because it will be rude and your mother would be offended.
6 0
4 years ago
In the osi (open system interconnection) model, data proceeds up through the layers on the receiving computer. true false
Lemur [1.5K]
<span>True. The OSI model presents a standard data flow architecture, with protocols specified in such a way that the receiving layer at the destination computer receives exactly the same object as sent by the matching layer at the source computer.</span>
7 0
3 years ago
A drainage network Choose one: A. is considered a trellis network when rivers flow over uniform substrate with a gentle slope. B
Semenov [28]

The Answer to this question is B

4 0
3 years ago
Which type of intrusion detection may terminate processes or redirect traffic upon detection of a possible intrusion?
katen-ka-za [31]

The process of intrusion detection includes monitoring and analyzing the network activity and data for potential vulnerabilities and attacks.

The active type of intrusion detection may terminate processes or redirect traffic upon detection of a possible intrusion.

The active IDS is known as an intrusion prevention system — IPS.  It automatically blocks suspected attacks in progress without any intervention required by an operator.

5 0
3 years ago
Other questions:
  • State College charges its departments for computer time usage on the campus mainframe. A student had access to the university co
    10·1 answer
  • Before renting or buying a multifamily dwelling you should know the __ of the building
    7·2 answers
  • Using the college registration example from section 6.7.3 as a starting point, do the following:
    14·1 answer
  • What should you consider when thinking about your target audience?
    12·1 answer
  • A wireless network was recently installed in a coffee shop and customer mobile devices are not receiving network configuration i
    12·1 answer
  • All of the following statements concerning project portfolios are true EXCEPT: ​ a. The projects in a portfolio are managed as a
    6·1 answer
  • Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "To
    5·1 answer
  • Type (dog, cat, budgie, lizard, horse, etc.) Create a class that keeps track of the attributes above for pet records at the anim
    7·1 answer
  • PORFA AYUDAAAA DOY CORONA (solo si puedo) ES DE TECNOLOGÍA
    12·1 answer
  • You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his l
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!