1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
4 years ago
13

Which program can damage your computer

Computers and Technology
2 answers:
Alex17521 [72]4 years ago
7 0
Viruses, spams, click ads
Mrac [35]4 years ago
3 0

the answer is viruses


You might be interested in
Slack how to enable direct message to outside workspace
natima [27]

Answer:

From your desktop, click on your workspace name in the top left. Select Settings & administration from the menu, then click Workspace settings. Click the Permissions tab. Next to Slack Connect for direct messages, click Expand.

Explanation:

8 0
3 years ago
When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
AleksandrR [38]

Answer:

C. 3

Explanation:

Linear Tape Open LTO tape drives are magnetic tapes used to store data. This can be used with small and large computers for backup purposes. The backup needs to maintained frequently so that new data is backup on every interval. The is a RAID failure on database server to ensure complete backup there must be 3  backup tapes needed.

4 0
3 years ago
Select the correct answer from each drop down menu
nadya68 [22]

Answer:

Blank 1: reflects

Blank 2: rays

sorry if i get this wrong those are the only two that makes sense.

Explanation:

6 0
3 years ago
Read 2 more answers
What is diffie-hellman most commonly used for?
Alex777 [14]
DH is an algorithm to derive a shared secret over an unsafe channel.

Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.

The secret can be used to subsequently encrypt communications with a symmetric algorithm.

TLS uses this approach.
6 0
3 years ago
Select the items below that are examples of things that could use the smart card technology.
balu736 [363]
Insurance cards, driver’s licenses, and pent cards
7 0
3 years ago
Other questions:
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·1 answer
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • Key physical database design decisions typically do not include: A) choosing the storage format for each attribute from the logi
    12·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • What will you do to run a presentation from a computer on which you did not prepare the presentation, and how?
    13·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Write the issue related to the cyber ethnic. ​
    7·2 answers
  • LANGUAGE IS PYTHON!!! PLEASE HELP
    12·1 answer
  • Tools such as microsoft's word, excel, and powerpoint are examples of ________ software. question content area bottom part 1 a.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!