1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
3 years ago
12

What type of impacts can a computer virus have on a computer?

Computers and Technology
1 answer:
kolbaska11 [484]3 years ago
5 0
Viral dna can be detected by PCR .
You might be interested in
What determines WiFi speeds, please list all your answers and explain how it affects the WiFi speed.
soldi70 [24.7K]
It’s hz and bandwidth, 5ghz is better then a 2.5ghz but the wavelength is more condensed so it won’t travel so far so the 5ghz will be faster but the 2.5ghz will go further.
8 0
3 years ago
What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it
oksian1 [2.3K]

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
8 0
3 years ago
Select the correct answer. Trackers are associated with which audio format?
KonstantinChe [14]
MP3 and FMsynthesid
7 0
4 years ago
Application software
Crazy boy [7]

Answer:

it would be B hope this helps

Explanation:

8 0
4 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
Other questions:
  • Which of the following statements is false?
    12·1 answer
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • Why is it so important that you know how much traffic dfs replication requires?
    13·2 answers
  • Using hard disk to temporarily store data or instructions from ram is referred to as the
    12·1 answer
  • Give a detailed example of how an app (that you use regularly)uses parameters. You must state the app's name and function, the p
    7·1 answer
  • Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 wo
    13·1 answer
  • What is the output?
    12·1 answer
  • Web design and development tools
    13·1 answer
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!