1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
4 years ago
15

Unlike other malware, a ____ is heavily dependent upon the user for its survival. trojan worm rootkit virus

Computers and Technology
1 answer:
KatRina [158]4 years ago
7 0
A virus is dependent on the user
You might be interested in
All of the following are guidelines for maintaining an engineering notebook EXCEPT
gayaneshka [121]

C) numbering pages at the bottom inside corner

An Engineering notebook is a legal document made of bound, grid paper where engineers formally document written ideas, sketches, work session summaries, research findings and interview information in chronological order.

When not in use, the notebook should be stored in a safe location with each page dated and signed.

There will absolutely no situation where a page is removed.

All entries should start at the top of each page and ending at the bottom. Supporting material should be permanently affixed.  

Book pages should be numbered on the top right side of the page.  


6 0
3 years ago
Greg works for an online games development company. He is not a net freak, but occasionally he visits online literature sites an
sweet-ann [11.9K]

Answer:

i think its A

Explanation:i hope i helped

5 0
3 years ago
(asking again because point-hogs exist)
yawa3891 [41]

The answer is 2-to-the-power-of-n, since for every input, the number of different combinations doubles. From your list I think answer A is meant to indicate 2ⁿ.

6 0
3 years ago
Prehistoric music was often written down on clay tablets
Fudgin [204]

It is false. Just took a quiz with this question. It is 100% FALSE because I put true and got it wrong.

4 0
3 years ago
Which of these is an application to control
N76 [4]

Not sure if your asking what certain application or the definition. But the definition: A security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk.

6 0
3 years ago
Other questions:
  • You could face mandatory revocation of your license as a result of __________ A. lying about ownership of your vehicle. B. drivi
    14·1 answer
  • What Are some examples of options you can use for bullets? Check all that apply
    14·1 answer
  • How do i get rid of pop ups??
    9·2 answers
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • What is considered Tim Berners-Lee's greatest contribution to the World Wide Web?
    5·1 answer
  • Help please appreciate it
    15·1 answer
  • What is the promotion and advertising stage of a product or service called?
    15·1 answer
  • Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a
    8·1 answer
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
  • What is the output?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!