1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
13

Computer virus is a a. software b. hardware c. bacteria d. none of these

Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
8 0
The answer is software
You might be interested in
HELP<br> When differentiating data, the WHAT of the data is:
Anna007 [38]

Answer:

a source and a target.

Explanation:

In computer science and information theory, data differencing or differential compression is producing a technical description of the difference between two sets of data – a source and a target.

7 0
2 years ago
What branch of science helps avoid or minimize stress-related injuries at workplace?
Vlada [557]

The answer is : Ergonomics.  This improvement process removes risk factors that lead to injuries and allows for improved human performance and productivity. Applying ergonomic solutions can make employees more comfortable and increase productivity. It is important because when doing a job and our body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

7 0
3 years ago
____ is a technology that exists inside another device
Julli [10]

Answer:

Embedded technology is a technology that exists inside another device.

8 0
3 years ago
Read 2 more answers
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
True or False: Unity can apply multiple textures to a single object or terrain
MaRussiya [10]
This is very true unity is what u said and it is the definition of this
3 0
3 years ago
Other questions:
  • Uses computers resources from multiple locations to solve ​
    13·2 answers
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • Checking tire pressure should be performed:
    11·2 answers
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    9·1 answer
  • Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre
    11·1 answer
  • Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
    14·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • 9.A major step before taking print of the document is (3 points)
    14·1 answer
  • Where is the BIOS stored?<br><br> CPU<br> CMOS<br> RAM<br> Northbridge
    13·2 answers
  • Consider a Huffman’s Algorithm that uses a variable-length encoding scheme to compress the original text: BIRTHDAY to determine
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!