1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
2 years ago
15

What can be designed to create annoying glitches or destroy data

Computers and Technology
2 answers:
Leya [2.2K]2 years ago
5 0

Answer:

Virus can be created to create disturbing problems or destroy data.

Explanation:

  • Virus is a mischievous program that self-repeates by copying itself to another program.  
  • The virus increases by itself into other executable code or documents.
  • It is really easy and simple for the viruses to slip into a computer by escaping the defense systems.
  • So the virus is the reason to create the problems and for destroying the data.
  • Virus enters its virus code to multiply itself by changing the programs and applications.  
Katen [24]2 years ago
3 0

I guess the best answer is Virus.

Virus is a malicious computer program that is designed to create annoying glitches or destroy data.

You might be interested in
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
aniked [119]
<span>With the use of a database application people can store and retrieve large quantities of data almost instantaneously. Database applications can also be used to present the information in easy to read and understand forms. Database applications serve as an intermediary between the raw data and a user, making it easier to sort and use the data.</span>
5 0
3 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
Who began digitizing books on a massive scale and putting them online?
Sholpan [36]

The answer is Google Cooperation.

Google began the mass digitization of bound volumes of books and as a result, it is getting widespread media attention. Google has had, and is still keeping up with its intention to digitize all the books across major USA libraries. Its intention is not to provide a reading environment, but rather create an online index to books in libraries and bookstores.

4 0
3 years ago
To differentiate the absolute pathnames to files that are located on different drives, html requires you to include the drive le
Ber [7]
<span>To differentiate the absolute pathnames to files that are located on different drives, HTML requires you to include the drive letter followed by a </span>vertical bar.
4 0
3 years ago
What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
uysha [10]

Answer:

phones = {'John': '1234567', 'Julie' : '7777777'}

Explanation:

In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.

3 0
3 years ago
Other questions:
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • What is basic function of an operating system?
    10·2 answers
  • Write a program that allows the user to convert a temperature given in degrees from either Celsius to Fahrenheit or Fahrenheit t
    13·1 answer
  • What's the 16-bit hexadecimal representation of the signed decimal integer, -331? Answeers?
    14·1 answer
  • A DESKTOP COMPUTER (NAMED WORKSTATION22) CAN'T CONNECT TO THE NETWORK. A NETWORK CARD WAS PURCHASED WITHOUT DOCUMENTATION OR DRI
    14·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • To ensure that comments identify the initials of the person making changes, you would need to _____.
    5·2 answers
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Read-only memory chips are used to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!