1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
2 years ago
10

A virus that propagates using the internet or another computer network is called __________.

Computers and Technology
1 answer:
olasank [31]2 years ago
8 0
This is called a worm
You might be interested in
What must be done before using ArrayLists?<br><br> (This is Java Programming btw)
Viktor [21]

Answer:

to create an ArrayList , you declare an Arraylist variable and call the ArrayList constructor to instantiate and ArrayList object and assign it to the variable

5 0
3 years ago
The goal of quality assurance is toprovide management with the data needed to determine whichsoftware engineers are producingthe
Ymorist [56]
The answer to your question is true
8 0
3 years ago
You have a desktop computer that supports both IEEE 1394 and USB 2.0. You are purchasing some devices that will connect to these
zimovet [89]

Answer:

IEEE 1394 supports more devices on a single bus

Explanation:

What this means is that IEEE 1394 provides a single plug-and-socket connection on which up to 63 devices can be attached with data transfer speeds up to 400 Mbps (megabit s per second). The standard describes a serial bus( A shared channel that transmits data one bit after the other over a single wire or fiber) or pathway between one or more peripheral devices and your computer's microprocessor .

7 0
3 years ago
The first place you should look for specific guidance on how to maintain your vehicle is
erica [24]

Answer: the instruction manual

Explanation: i dont take this course, so this is just my common knowledge

5 0
2 years ago
Read 2 more answers
Name this<br><br>The feature allows you to add text/picture in the background of the document. ​
sertanlavr [38]
I think it is picture/text wrapping

I wouldn’t trust this though

I’m sorry if it’s wrong
4 0
2 years ago
Other questions:
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • List of programming languages and their typing
    5·2 answers
  • Write the include directive that allows use of the function headers in the file myFuncs.h.
    13·1 answer
  • In which two places are a keyboard usually held on a laptop?
    9·1 answer
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • What are three consequences of a negative digital Trail​
    9·1 answer
  • Write the definition of a method, isReverse, whose two parameters are arrays of integers of equal size. The method returns true
    10·1 answer
  • Which operating system (OS) is used to run your laptop?
    15·2 answers
  • Porque es importante la tecnología?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!