1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
4 years ago
13

Computer virus is a a. software b. hardware c. bacteria d. none of these

Computers and Technology
1 answer:
Nimfa-mama [501]4 years ago
8 0
The answer is software
You might be interested in
Accepted identifier for a variable in PHP except:
olganol [36]

Answer:

b. & Puihaha

Explanation:

PHP variables are supposed to start with a $ sign.

Other rules followed by PHP variables are:

Starting character in variable name (after $) must be letter or _.

Other characters in variable names can be letters,numbers or _.

a. $_Puihaha

c. $Pui_haha

d. $Puihaha

satisfy these rules.

Whereas , b. & Puihaha does not satisfy as it starts with '&'. Moreover it also contains an invalid space character in the variable.

3 0
3 years ago
How does an ip address allow your computer to be reached
LiRa [457]
Not sure if this helps

The "IP" part of IP address stands for "Internet Protocol." The "address" part refers to a unique number that gets linked to all online activity you do...somewhat like a return address on a letter you'd send out. (All this happens in milliseconds.)
Your computer is hooked up to the Internet, one way or the other. When you go online for email, to shop or chat, your request has to be sent out to the right destination, and the responses and information you want need to come back directly to you.

An IP address plays a significant role in that.

You and your computer actually connect to the Internet indirectly: You first connect to a network that is 1) connected to the Internet itself and 

8 0
3 years ago
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
write up a performance review for a fellow employee. Imagine you work in a shop and this is a fellow salesperson on the shop flo
son4ous [18]

Answer:

I'd give him the lowest performance review because who knows what he does, I mean, he is on the floor, not doing anything, especially not working.

8 0
3 years ago
What is the name of the place where students access all of their course information? Student handbook. Learning management syste
ehidna [41]
The syllabus is where students can find their course information.
3 0
3 years ago
Other questions:
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • In CadStd, what does the Zoom All button do? A. Makes a drawing bigger so you can see small details B. Returns a drawing to a si
    5·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • List the step in turning on a computer
    6·1 answer
  • List the instructions of how you would make a PBJ sandwich as a series of five (5) steps (tasks) in the first column Complete th
    14·1 answer
  • How to change your name to a fake one
    8·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no para
    8·1 answer
  • Put Your Zom Here If You In Zom
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!