1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
15

Which is most harmful computer virus define​

Computers and Technology
1 answer:
Ganezh [65]3 years ago
3 0

Answer:

Spyware is the most harmful virus.

It enters into someones computer as a spy and steals the ones personal information, data and other codes.

Explanation:

You might be interested in
Implement A* graph search. A* takes a heuristic function as an argument. Heuristics
svetlana [45]
It may be the reason
7 0
3 years ago
Draw a flowchart diagram for a program that displays numbers 1 to 20
madreJ [45]
Here you go plz mark brainlist
6 0
2 years ago
How is kerning used in Word?
kirill115 [55]

Answer: To adjust the spacing between characters that make up a word

Explanation: Kerning refers to the way spacing between two specific characters is adjusted. The idea is to give a better looking result by reducing the spacing between characters that fit together nicely (such as "A" and "V") and increasing the spacing between characters that don't. Select the text that you want to change.

4 0
2 years ago
What Active Directory object enables an administrator to configure password settings for users or groups that are different from
e-lub [12.9K]

Answer:

Password Settings object

Explanation:

Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.

In AD, the data stored are also known as Objects, these objects can be

  1. users or a group that has been given passwords and/or
  2. resources such as computers or printers.
  3. Organizational Units (OUs)

The object responsible for handling the configuration of passwords configuration is the Password Settings object.

Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.

8 0
3 years ago
Which of the following statements correctly describe a computer program?
Naddik [55]

Answer: A. It’s a robust way to find information

Explanation:

Hope this help.

3 0
3 years ago
Read 2 more answers
Other questions:
  • An engine's _______ contains the cylinder block, the cylinders, the piston, the connecting rods, and the crankshaft assemblies.
    9·2 answers
  • Evidence that Social media hasn’t improved human communication.
    12·1 answer
  • Why does temperature decrease with higher altitude?
    14·1 answer
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • A______ is a graphical representation of numeric data.
    8·1 answer
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • DECIPHER AND SOLVE THIS<br><br> SCC:R<br> D<br> YJOTE VP=GPIMFRT
    15·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • We call any device connected to the Internet a(n) ________. Group of answer choices router host IP client
    9·1 answer
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!