1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
2 years ago
15

An unwanted program that can spread itself to other computers is called what?

Computers and Technology
2 answers:
Setler [38]2 years ago
6 0
Malware or virus is an unwanted program that is downloaded to your computer.
Fiesta28 [93]2 years ago
3 0
A computer virus is a harmful code that can "infect" other computer systems.
You might be interested in
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
3 years ago
When data are entered into a form and saved, they are placed in the underlying database as knowledge?
luda_lava [24]
The answer would be and is true.
7 0
3 years ago
What should you do when an error message pops up on the screen?
gladu [14]
D.) Write down the error message and research the cause based on the message.
5 0
3 years ago
Read 2 more answers
(Type the correct answer in the box.)
mihalych1998 [28]

1. If in MS Access, Click on Query design, select the required Table.

 In Field select required field, in this case Select [Name of Plants]. Click on Order and set it as Ascending / Descending.

2. If you want to write a Query that it will look like this

SELECT MedicinalPlants.Name of the plantsFROM MedicinalPlantsORDER BY MedicinalPlants.Name of the Plants;

Read more on Brainly.com - brainly.com/question/3433328#readmore

4 0
3 years ago
Read 2 more answers
20 points
riadik2000 [5.3K]
By the year 2030, artificial intelligence (A.I.) will have changed the way we travel to work and to parties, how we take care of our health and how our kids are educated.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the
    8·1 answer
  • You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi
    7·1 answer
  • What’s good and bad about having social media?
    14·2 answers
  • Write a program in java that reads each line in a file, reverses its characters, and writes the resulting line to another file
    15·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • I re-made the human version of Daddy Dearest from Friday Night Funkin
    14·2 answers
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
  • What is the best resource to learn python?
    14·2 answers
  • Which of the following Access objects provides a user-friendly data entry method?
    7·1 answer
  • You have recently installed Windows Server 2019 Desktop Experience on a server. Your manager informs you that he needs to extens
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!