1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
15

which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam

D. Phish
Computers and Technology
1 answer:
Svetlanka [38]3 years ago
8 0
B. virus
i hope i helped you :)
You might be interested in
Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr
tamaranim1 [39]

Answer:

A.  they can skip whole segments of the software development process.

Explanation:

A software development process refers to the process of dividing software development work into various phases for product management, project management and to improve the design.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because they can skip whole segments of the software development process.

They don't have to go through different phases of software development.

6 0
3 years ago
Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
kipiarov [429]
The answer is Integrated Development Environment (IDE). Many programmers today use Integrated Development Environment (IDE) which is a software that helps them build their computer programs. It gives complete facilities to computer programmers for software development.  
8 0
3 years ago
What permissions are needed in order to use a work online that is in the public domain?
Maurinko [17]
<h2 /><h2>⇒Written  \: permission  \: from \\  the  \: creator</h2>

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

5 0
3 years ago
What do you understand by cloud computing? list the advantages of clould computing.​
LenaWriter [7]

Answer:

Cloud infrastructures support environmental proactivity, powering virtual services rather than physical products and hardware, and cutting down on paper waste, improving energy efficiency, and (given that it allows employees access from anywhere with an internet connection) reducing commuter-related emissions.

Explanation:

3 0
3 years ago
Read 2 more answers
Would you rather be rich and unknown or famous and poor
ollegr [7]

Answer:

rich g

Explanation:

5 0
3 years ago
Other questions:
  • People in STEM careers are considered thinkers who reach conclusions through sound judgment and reasoning.
    11·1 answer
  • How do I download the Microsoft word on my Hp probook
    8·2 answers
  • 1. [2 points] Write a function to compute the volume of a sphere, given its radius. 2. [2 points] Write a recursive function to
    7·1 answer
  • Define a romanNumberToInt function that converts a RomanNumber value, which is a list of Roman digits, into an integer. Hints: -
    7·1 answer
  • Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
    9·1 answer
  • Please check my answer! (Java)
    7·1 answer
  • What Fortnite skin is more og?
    5·2 answers
  • Three reasons Why we connect speakers to computers
    15·2 answers
  • List out any four hardware and software components required for multimedia​
    10·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!