1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
15

An unwanted program that can spread itself to other computers is called what?

Computers and Technology
2 answers:
Setler [38]3 years ago
6 0
Malware or virus is an unwanted program that is downloaded to your computer.
Fiesta28 [93]3 years ago
3 0
A computer virus is a harmful code that can "infect" other computer systems.
You might be interested in
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
A minor with prior convictions of Minor in Possession (MIP) who is charged with a subsequent MIP may be penalized with a jail se
GarryVolchara [31]
The minor may be penalized with a jail sentence of up to thirty days for his second offence.  A jail sentence of up to sixty days is possible for third offence. Under MCL 436, a minor is someone who is under twenty one years old. Such minors may not purchase, consume or be in possession of any alcoholic liquor. Possession of alcoholic drinks can be actual or constructive. It is actual when you have direct physical control over it and it is constructive when you know where it is and you have reasonable access to it.
3 0
3 years ago
Read 2 more answers
The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
Flura [38]
To manage and organise multiple kinds of traffic, the wide area network statistically multiplexed technology that could be used would be the ATM. Also known as the asynchronous transfer mode, this type of connection using fixed cells in encoding data with regards to the situational traffic.
5 0
3 years ago
Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?
vaieri [72.5K]

Answer: Dynamic packet filtering

Explanation:

Dynamic packet filtering is the type of fire wall which is used automatically to enabled the modification in the real time based on the traffic content according to the filtering rules.

The dynamic packet filtering also facilitates to monitor the actual state of connection which is active.

It is also used to determine the actual state of network packet and permits the packet of network pass through firewall.

7 0
3 years ago
You are a database administrator. Chantelle comes to you asking for help on how to access all the data in one row of the databas
Novosadov [1.4K]
I believe the answers would be A and B. Because you have to fulfill  Chantelle's wishes and you have to access their data. Which I am guessing would require a database backup.  

I hope this helps. 
7 0
3 years ago
Other questions:
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • When doing black and white photography, which file format should you use if possible? JPEG TIFF PNG RAW
    11·2 answers
  • Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
    14·1 answer
  • Write only in C, not C++.
    14·1 answer
  • Write an abstract data type for a queue in Java whose elements are generic elements of type T that have an associated integer pr
    15·2 answers
  • What differentiates Accenture's Intelligent Platform Services (IPS) when our clients are making a decision to partner with a ser
    13·1 answer
  • In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message
    11·1 answer
  • One benefit proprietary licensed software is that it
    9·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
  • which cyber protection condition establishes a protection priority focus on critical and essential functions only
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!