1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
4 years ago
13

Computer virus is a a. software b. hardware c. bacteria d. none of these

Computers and Technology
1 answer:
Nimfa-mama [501]4 years ago
8 0
The answer is software
You might be interested in
PLS FAST DONT EXPLAIN
Rzqust [24]

Answer:

</head>

Explanation:

8 0
3 years ago
How many report charts can be added to the account page layout to meet this requirement? A sales manager would like to look at a
Virty [35]

Answer:

D - 2

Explanation:

You can have two report charts per page. You can only add report charts from the enhanced page layout editor.

The mini console and the original page layout editor are not supported. On detail pages, users can refresh up to 100 report charts every 60 minutes. Your organization can refresh up to 3,000 report charts every 60 minutes

8 0
4 years ago
On a timeline, a milestone 11 years in the future will be to the
aniked [119]

Answer:

D. Left,left

11 is less than 20 as well as it is less than 25 years. And we move from left to right on the timeline. Thus 11 is left of 20 and it is left of 25 years as well. And timeline is the core of a project management software. The Gantt and Pert chart are totally based on the timeline. Software like Microsoft project use the timeline quite a lot, and you cannot survive without the knowledge  of the timeline in software project management.

Explanation:

Timeline knowledge is a must for a software professional, and the above answer does not require explanation.

6 0
4 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
Devices such as monitors and printers that are connected to a computer are called ________.
eimsori [14]
Those are referred to peripherals.
4 0
3 years ago
Other questions:
  • This career involves answering questions about computer parts and trouble shooting broken computers? Video game designer, comput
    10·1 answer
  • NEED HELP PLEASEE!!!
    9·1 answer
  • How can I make a video game?
    8·2 answers
  • What are three advantages of using social media to create awareness of your business?
    6·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • I’m wondering how to get images to show on my computer because at the moment images won’t show and I’ve cleared my cache and eve
    14·1 answer
  • In order to send a photo in a text message from your cell phone to your cousin's cell phone who lives in New Zealand, is it nece
    8·1 answer
  • What is the most important job of a web server?
    11·2 answers
  • Assume that two students are trying to register for a course in which there is only one open seat. What component of a database
    12·2 answers
  • O
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!