1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
10

You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard a

nd mouse input. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?
A. You opened an e-mail attachment.
B. You sent an e-mail message with an attachment to a co-worker.
C. You logged in to your company's portal.
D. You printed a file that was stored on your hard drive.
Computers and Technology
1 answer:
Romashka-Z-Leto [24]4 years ago
7 0
I think it’s A have no idea tho
You might be interested in
You decide to store data in the user's browser in order to reduce the amount of data that must be downloaded. What is this proce
Lemur [1.5K]

Answer:

client-side storage

Explanation:

The process of doing this is known as client-side storage. Like the name suggests this saves data that is sent to the user's computer on that computer either as cookies or cached data. This data is then used every time that the user decides to enter the same website or access the same program from the browser. Doing this allows these websites and programs to load much faster the more times that the user decides to enter them.

5 0
3 years ago
Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
SSSSS [86.1K]

Answer:

C++ code explained below with its sample outputs

Explanation:

Twitter.h

========

#ifndef Twitter_h

#define Twitter_h

#include <iostream>

using std::string;

using std::cout;

using std::endl;

template <typename T>

class Twitter

{

private:

string name;

T followers[5];

int numFollowers;

public:

Twitter(string n);

bool AddFollower(T follower);

bool RemoveFollower(T follower);

void PrintFollowers();

};

template <typename T>

Twitter<T>::Twitter(string n)

{

name = n;

numFollowers = 0;

}

template <typename T>

bool Twitter<T>::AddFollower(T follower)

{

if(numFollowers < 5)

{

followers[numFollowers] = follower;

numFollowers++;

return true;

}

else

return false;

}

template <typename T>

bool Twitter<T>::RemoveFollower(T follower)

{

int index;

bool found = false;

for(index = 0; index < numFollowers; index++)

{

if(followers[index] == follower)

{

found = true;

break;

}

}

if(found)

{

//shift all other followers after the one to be removed to one position left

for(++index; index < numFollowers; ++index)

{

followers[index-1] = followers[index];

}

numFollowers--;

return true;

}

else

return false;

}

template <typename T>

void Twitter<T>::PrintFollowers()

{

cout << "Followers for " << name << endl;

for(int i = 0; i < numFollowers; i++)

cout << followers[i] << endl;

 

cout << "------" << endl << endl;

}

#endif /* Twitter_h */

main.cpp

=========

#include "Twitter.h"

#include <iostream>

using namespace std;

struct Profile {

string userName;

int age;

string state;

};

 

ostream& operator << (ostream & output, Profile p) {

output << p.userName;

return output;

}

bool operator == (const Profile &p1, const Profile p2)

{

return p1.userName == p2.userName;

}

int main()

{

Twitter<string> t1("John");

Twitter<Profile> t2("Bob");

 

cout << "Adding followers to John" << endl;

t1.AddFollower("Bill");

t1.AddFollower("Jack");

t1.PrintFollowers();

 

Profile p1 = {"Alice", 20, "Alaska"};

Profile p2 = {"Janet", 22, "California"};

Profile p3 = {"Jim", 20, "Texas"};

 

cout << "Adding follower profiles to Bob" << endl;

t2.AddFollower(p1);

t2.AddFollower(p2);

t2.AddFollower(p3);

t2.PrintFollowers();

 

cout << "Removing Bill from John" << endl;

t1.RemoveFollower("Bill");

 

cout << "Removing Janet's profile from Bob" << endl << endl;

t2.RemoveFollower(p2);

 

t1.PrintFollowers();

t2.PrintFollowers();

 

 

 

}

output

-======

Adding followers to John

Followers for John

Bill

Jack

------

Adding follower profiles to Bob

Followers for Bob

Alice

Janet

Jim

------

Removing Bill from John

Removing Janet's profile from Bob

Followers for John

Jack

------

Followers for Bob

Alice

Jim

------

6 0
3 years ago
Which of the following is a locate tool that will enable you to navigate to cell M291?
scoundrel [369]

just answered it its<u><em> Go To</em></u>

3 0
4 years ago
An assembly line is an example of which of the following facility layouts?
ikadub [295]

Answer:

Product layout

Explanation:

In configuration of facilities, the four layouts used are the process, product, cellular and fixed-position layouts.In process layout, operations that have similar functions are placed together. Example is a machine shop in manufacturing scenario.Product layouts are applied where there is repetitive assembly and processes.For example in flow shops where large volume of products are produced in a short time. Products that are very large or too heavy use fixed position layouts.Example is ship building or dam construction which require on-spot job performing.Cellular layouts is an equipment layout that will ease the process of cellular manufacturing.For example in group technology, parts of similar designed are identified to be grouped with processes that have similar characteristics to avoid re-arranging of layouts.

6 0
3 years ago
What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
defon
A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program<span> that gets the requests from clients and seeks resources from other </span>servers. It is a <span>intermediary point between the end user and the backbone network.</span>
8 0
3 years ago
Other questions:
  • Which are elements involved in diagramming a solution? Choose all that apply.
    10·1 answer
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • Memory management is concerned with __________.
    14·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    11·1 answer
  • Which of the following tasks is least effective at preventing a computer virus?
    7·1 answer
  • Strobe lights can become more yellow as they age true or false
    8·1 answer
  • Hi i choose brainlyest 4 free
    13·2 answers
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
  • What is a decryption key?​
    8·1 answer
  • What is the minimum amount of hard drive space required for a 64-bit Windows 10 installation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!