1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
9

A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-unde

sirable event for the victim.
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
7 0

Answer:

A computer virus

Explanation:

A computer virus is categorized as malicious software that is built just like any other program out there to cause damage, steal, or disrupt a victim’s computer system. They infect systems and networks in various ways. Most are designed to move in stealth and attach themselves to other programs. Others, however, exploit an unpatched vulnerability and propagate themselves into harmful programs. Depending on how they are designed, most viruses insert a copy of themselves, spread rapidly from within files of a computer, and even extend to other computers in a network.

You might be interested in
give an example of a technical issue you were not able to resolve on your first attempt. What troubleshooting steps did you take
erastovalidia [21]
One technical issue I had was on Windows 8.1, with the charm menu not working. The troubleshooting steps to fix it was I did CTRL+SHIFT+ESC to open task manager. I then found Windows Explorer and clicked "Reload." Then everything was fine.

Hope This Helped!
6 0
3 years ago
Sending a employee an email with important criticism represents a problem which communication process
Evgen [1.6K]
<span>I am definitely sure that sending an employee an email with important criticism represents a problem in message channel. Message channel is one of the ways through which two parties (manager-employee) communicate with each other.</span>
7 0
3 years ago
Question # 6
insens350 [35]

Answer:

April 30, 1993

Explanation:

On April 30, 1993, four years after publishing a proposal for “an idea of linked information systems,” computer scientist Tim Berners-Lee released the source code for the world’s first web browser and editor.

4 0
3 years ago
The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
olga55 [171]

Answer:

The correct answer for the given question is option(A) i.e File History.

Explanation:

In computer system file history is an backup application which create backup of your data which are stored in your libraries, desktops, contacts, and favorites to another storage location .It creates back up of your data  to another location when your personal files has been changed.

The user can check the file history option in computer system

open control panel >>system and security >> file system

7 0
4 years ago
How does light move? Shift? Bounce between different objects?
ZanzabumX [31]

Answer:

Bounce between different objects

Explanation:

Light probably will bounce off of objects or it might go through, i think it depends on what object and what material.

6 0
4 years ago
Other questions:
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • A web ______ is a computer that delivers requested webpages to your computer or mobile device.
    7·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • Which of the following are mass communication methods? (Select all that apply.)
    9·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • Digital communications describes a process in which two or more computers or devices transfer ____, ____ and instructions.
    12·1 answer
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT? ip
    13·1 answer
  • Which original VPN protocol is supported by most platforms but offers low levels of security?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!