1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
4 years ago
11

A ________ is a virus that is triggered on a certain date.

Computers and Technology
1 answer:
marysya [2.9K]4 years ago
8 0
A time bomb virus is a virus that is triggered on a certain date. It is a malicious program that is designed to release virus unto a system. Once the time has arrived, it will automatically start working what it is programmed to do since any virus could do anything depending on what it is designed to do.
You might be interested in
Pick the correct characteristics that define the porous inkjet paper.
Arisa [49]

Answer:

"Porous inkjet paper produces high-quality photos." and "Porous paper fades and scratches easily."

Explanation:

i took the test

4 0
3 years ago
Which of the following statements should be avoided when developing a mission statement?
Citrus2011 [14]

Answer: The how-to statements

Explanation:

The mission statement is simply a short summary of the purpose of a company. It is the guideline on how a company will operate. The mission statement states the reason for the existence of a company, products sold or service rendered and the company's goals.

The mission statement should be brief but comprehensive, consist of simple words and describe the “who, what, and where” of the organization.

Therefore, the incorrect option based on the explanation above is "The how-to statements". This shouldn't be part of the mission statement.

3 0
3 years ago
Write a code segment that takes an emailaddress stored in the string email and stores theuser name in the string user and the ho
iragen [17]

Answer:

#include <bits/stdc++.h>

using namespace std;

int main() {

  string email,username,host;//strings to store email,username,hostname..

  cout<<"Enter the email address "<<endl;

  cin>>email;//taking input of email address..

  bool flag=1;

  for(int i=0;i<email.length();i++)//iterating over the string email..

  {

      if(email[i]=='@')//if @ symbol is encountered make flag 0 skip this iteration.

      {

          flag=0;

          continue;

      }

      if(flag==1)//add to username if flag is 1.

      {

          username+=email[i];

      }

      else//add tom host..

      host+=email[i];

  }

  cout<<"The username is "<<username<<endl<<"The host name is "<<host;//printing the username and hostname..

return 0;

}

Explanation:

I have taken  three strings to store the email address entered by user ,username and host to store username and host name respectively.Then I am iterating over the string email if @ is encountered then skip that iteration before that keep adding characters to username string and after that keep adding characters to host.

8 0
3 years ago
Which of the following is the fastest way to open an Access database? a. Right-click the database icon. b. Start Access from the
STALIN [3.7K]

Answer:

C. Double-click the database icon.

5 0
3 years ago
Read 2 more answers
A bluetooth device in ____ mode is part of the piconet but is in a low-power state.
adelina 88 [10]
A bluetooth device in park/hold mode is part of the piconet but is in a low-power state. These are power saving modes of operation for Bluetooth devices which are connected to a piconet and  are used when no data is to be transmitted.The hold mode is used when connecting several piconets or managing a low-power device such as temperature sensor. When the park mode is used t<span>he device is still synchronized to the piconet but does not participate in traffic.</span>
7 0
3 years ago
Other questions:
  • Any program that allows the user to select an item from a menu should ________ the user's selection.
    7·1 answer
  • Your company has recently been hired to install a smart security system for a large office building. The system will include sec
    12·1 answer
  • The penalties for a person's third DUI conviction include fines of __________.
    11·2 answers
  • Please Help!! How to code this in Python?
    11·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • List any three positive impact of a computer​
    9·1 answer
  • How was science used to make television?
    6·2 answers
  • Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST<br> pins?
    8·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!