1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
13

Recently, there was an outbreak of a computer virus, known as the Melissa virus. The FBI is determining whether the virus meets

the requirements in the criminal code for an investigation. Which legal justification should be used by the FBI to pursue this matter?
a. Creation of computer viruses are illegal.b. Approval from Microsoft was not granted using Microsoft’s Outlook program to spread the virus.c. The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.
Engineering
1 answer:
never [62]3 years ago
5 0

Answer:

Correct answer is (c)

Explanation:

The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.

Melissa virus is a computer program that was meant to cause serious damage to computer system by sending e-mail from an infected computer to the mail address on that computer. The virus was investigated by the FBI's National Infrastructure Protection Center. By transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer, The FBI's NIPC will be able to investigate how Melissa is being proliferated.

You might be interested in
You do not need to remove the lead weights inside tires before recycling them.
almond37 [142]
There are NO “lead weights inside tires”!

Balancing of the entire wheel (rim plus tire ) is done by correctly fitting the tire to the rim to begin with (new tires have printed coloured marks identifying the heavy and light bits), and then by adding balancing weights to the metal rim, usually made of lead but not always.

If you’re recycling rims then yes, remove the weights and recycle those separately.
6 0
3 years ago
How would you expect an increase in the austenite grain size to affect the hardenability of a steel alloy? Why?
seraphim [82]

Answer:

The hardenability increases with increasing austenite grain size, because the grain boundary area is decreasing. This means that the sites for the nucleation of ferrite and pearlite are being reduced in number, with the result that these transformations are slowed down, and the hardenability is therefore increased.

3 0
3 years ago
Gray cast iron, with an ultimate tensile strength of 31 ksi and an ultimate compressive strength of 109 ksi, has the following s
suter [353]

Using an appropriate failure theory, find the factor of safety in each case. State the name of the theory that you are using the theory is max stress theory.

<h3>Wat is the max stress theory?</h3>

The most shear strain concept states that the failure or yielding of a ductile fabric will arise whilst the most shear strain of the fabric equals or exceeds the shear strain fee at yield factor withinside the uniaxial tensile test.”

Stress states at various critical locations are f= 2.662.

Read more about strain:

brainly.com/question/6390757

#SPJ1

3 0
2 years ago
How do I draw this from the side?
tangare [24]

Answer:

draw it 3D

Explanation:

because it's a 3D picture

6 0
3 years ago
What are the steps to execute an instruction by cpu?What is the function of DMA controller.
JulijaS [17]

Explanation:

1. A sequence of instructions is stored in memory.

2. The memory address wherever the first instruction is found is copied to the instruction pointer.

3. The CPU sends the address within the instruction pointer to memory on the address bus.

4. The CPU sends a “read” signal to the control bus.

5. Memory responds by sending a copy of the state of the bits at that memory location on the

data bus, that the CPU then copies into its instruction register.

6. The instruction pointer is automatically incremented to contain the address of the next

instruction in memory.

7. The CPU executes the instruction within the instruction register.

8. Go to step 3

Steps 3, 4, and 5 are called an instruction fetch. Notice that steps 3 – 8 constitute a cycle, the instruction execution cycle. It is shown graphically below.

A DMA controller can generate memory addresses and initiate memory read or write cycles. It contains several hardware registers that can be written and read by the CPU. These include a memory address register, a byte count register, and one or more control registers.

4 0
3 years ago
Other questions:
  • Design a notch filter to remove the 60Hz from us.
    14·1 answer
  • PLEASE HURRY TIMED TEST
    7·2 answers
  • There are four distinct events that occur in the Carnot cycle. Name the events and describe each one.
    15·1 answer
  • What way the Robotics field is going to impact 1. Industry and productivity 2 . Environment 3. Medical field 4. Economics. From
    15·1 answer
  • The specific gravity of a substance that has mass of 10 kg and occupies a volume of 0.02 m^3 is a) 0.5 b) 1.5 c) 2.5 d) 3.5 e) n
    11·1 answer
  • A hydraulic jump is induced in an 80 ft wide channel.The water depths on either side of the jump are 1 ft and 10 ft.Please calcu
    5·2 answers
  • When a motorist passes a bicyclist, what is the minimum legal distance (clearance) to leave between vehicle and bike? *
    9·1 answer
  • Concerning the storage battery, what category of the primary sources is voltage produced?​
    13·1 answer
  • The National Park Service is waiting on your recommendation.
    7·1 answer
  • a) At a particular company, employees are rated at the end of each year. The rating scale begins at 0.0, with higher values indi
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!