1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
4 years ago
7

What is the common name for a program that has no useful purpose but attempts to spread itself?

Computers and Technology
1 answer:
joja [24]4 years ago
6 0
Its a virus, malware, keylogger , or trojan
You might be interested in
Write an interactive Python calculator program. The program should allow the user to type a mathematical expression, and then pr
kozerog [31]

Answer:

please check this images that are below

Explanation:

3 0
3 years ago
Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
gogolik [260]

Repetition structures, or loops, are used when a program needs to repeatedly process one or more instructions until some condition is met, at which time the loop ends. Many programming tasks are repetitive, having little variation from one item to the next. Vectorized mathematical code appears more like the mathematical expressions found in textbooks, making the code easier to understand. That is the difference. Hope I could help you on Brainly.com!

6 0
4 years ago
What is the type of person of personal computer which is also called a laptop computer?
gulaghasi [49]

Today personal computer is changed to laptop mode. Personal computer is made of CPU, monitor, keyboard, printer and mouse. All input device and output device connected with wire or without wire.

<u>Explanation:</u>

Personal computers are also called as desktop or workstation. These days all become compatible device which is called as laptop.

Basically all input devices and output device are fixed in laptop so end user can carry the laptop and used anywhere.

Laptop is charged and used, whereas desktop or workstation just fixed in the table and used it.

7 0
4 years ago
A block style business letter is
Molodets [167]

Answer:

Block style is a special style or format that is adopted to write Business Letters.

Explanation:

We all know that for writing Business Letters a formal style is adopted in order to convey important information regarding business matters.

So by following Block Style in the Business Letters we mean to write the letter according to the rules below:

Text for the letter should be justified Left completely.

Single spacing should be used for text.

Double spacing should be used for paragraphs.

1 inch margin should be left on each side.

Built-in Letter Wizard for formatting can also be used while dealing with BLOCK STYLE FOR BUSINESS LETTERS.

I hope it will help you!

7 0
4 years ago
why is it important for you to understand and describe the internal and external components of a computer in the workplace​
zhannawk [14.2K]

Hi! I have been troubleshooting and building PCs all my life and I find it very important to know the the internal core components of a PC and how they function that way when errors occur you can attempt to fix the problem.

Ex1: Lets say your BIOS identifies a problem with a RAM slot you would be able to know that your RAM slot is either shorted or there is a problem with the RAM stick you inserted.

Ex2: Now your monitor is flashing and turning colors randomly. You could make an inference that either your monitor is prongs are broken, your cable prongs could be bent, your cable might not be plugged in all the way, or your external or integrated GPU is toast.

Hope this might've showed you something

Aaron

7 0
3 years ago
Other questions:
  • What is a drawback to being in Slide Show mode? a- Being able to review each slide in order
    8·2 answers
  • Running fewer applications at once is a way to resolve which type of bottleneck?
    9·1 answer
  • What is the term used for the document that describes the scenes and sequence of a game?
    6·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Program should allow for user to enter students name and his four test scores it should calculate and display the average and le
    7·1 answer
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • Does anyone have Rblx? if so write your username
    6·1 answer
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!