1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
4 years ago
9

A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-unde

sirable event for the victim.
Computers and Technology
1 answer:
NNADVOKAT [17]4 years ago
7 0

Answer:

A computer virus

Explanation:

A computer virus is categorized as malicious software that is built just like any other program out there to cause damage, steal, or disrupt a victim’s computer system. They infect systems and networks in various ways. Most are designed to move in stealth and attach themselves to other programs. Others, however, exploit an unpatched vulnerability and propagate themselves into harmful programs. Depending on how they are designed, most viruses insert a copy of themselves, spread rapidly from within files of a computer, and even extend to other computers in a network.

You might be interested in
What does this say:<br> √ans
dangina [55]

Answer: I do belive is says Vans

Explanation:

5 0
3 years ago
Read 2 more answers
What is the main difference between EDBAC and EDNIAC......​
lawyer [7]

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

6 0
4 years ago
Read 2 more answers
what are some steps Hector could have taken to ensure that his photographs were not ruined near the end of the shoot?
galben [10]

Answer:

make several extra copies of the pictures and frame them right away if they're printed out.

Explanation:

3 0
2 years ago
Explica el empleo de cuentas y contraseñas en archivos
RideAnS [48]

Answer:Una contraseña o clave es una forma de autentificación que utiliza información secreta para ... Algunos sistemas almacenan contraseñas como archivos de texto. ... En muchos casos, particularmente con las cuentas de administradores o ... que los usuarios tiendan a olvidar cual es la contraseña actual.

Explanation:

espero te sirva jeje

8 0
3 years ago
Why are computers assigned IP addresses?
ladessa [460]

Answer:An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

6 0
3 years ago
Other questions:
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • In the story, what are the song pauses a metaphor for?
    7·1 answer
  • Kwan is using JavaScript extensively to add interactivity to his Web site. Contained within his script is a counter object that
    8·1 answer
  • Isp servers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the
    6·1 answer
  • An athlete runs every day for five days. Write a program that computes the total distance and average distance ran by the athlet
    10·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • When a binary tree is full to its next to last level and its leaves on the last level are filled from left to right the tree is
    14·1 answer
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
  • Objective a right turn true or false?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!