1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
8

A word processing program would probably be used to: 

Computers and Technology
1 answer:
Llana [10]3 years ago
5 0
B. create a contract to hire someone.
You might be interested in
Please help me with this coding problem :)
leonid [27]

Answer:

ll and lll

Explanation:

list dont be a looser

8 0
3 years ago
Who was the father of computer?????​
adell [148]

Answer:

Charles Babbage

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following image file formats uses lossy file compression?
enyata [817]

Answer:

JPEG

Explanation:

5 0
3 years ago
Consider the following methods:
il63 [147K]
<span>2. basketball This is a classic case of overloading in C++. You have 2 functions, both named "printSport", but one of the functions receives an input of type double, and the other receives an input of type int. The specified method call passes a parameter of type int, so the version of printSport is called that receives a parameter of type int. And that version of printSport only prints the word "basketball". The other version of printSport is never called at all.</span>
4 0
3 years ago
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Other questions:
  • How long can a lightning last
    13·1 answer
  • What is constructive criticism?
    5·1 answer
  • Which of these engine components forms a tight seal between the piston and the cylinder and is necessary for proper engine opera
    13·2 answers
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • Which of the following is a name for the place an information services and support professional might work? software development
    15·2 answers
  • Memory cache is referred to as ______. A. SRAM c. SROM b. DRAM d. DROM
    11·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • What is the definition of trouble shooting.
    12·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • A large organization is struggling to close the gaps in skill levels that exist between its employees and those from competing c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!