1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
7

I have a Lenovo laptop and I noticed a laptop with the name Le0OJU32 was listed as a device on my network? Is this just my lapto

p screen or have I been hacked??
Computers and Technology
2 answers:
sweet-ann [11.9K]3 years ago
5 0
You ha e been hacked unfortunately
xxMikexx [17]3 years ago
4 0

U HAVE BEEN HACKED MY BROTHER/SISTER

You might be interested in
Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
Alecsey [184]

Answer:p=float(input("Enter current bank balance:"))

i=float(input("Enter interest rate:"))

t=float(input("Enter the amount of time that passes:"))

print((p ((1+i)*t)))

Explanation:if this answer it looks weird its my phones fault

4 0
3 years ago
Read 2 more answers
a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
Maurinko [17]

Answer:

would it be term and tequnique?

Explanation:

oooooooo

7 0
3 years ago
Arctic Gear LLC. recently adopted a new ERP​ system, but quickly found that it​ wasn't a perfect fit with their existing procedu
inysia [295]

Answer:

The answer is "Option c".

Explanation:

GAP analyses are worked to specify the business operations and function. It  helps developed the ERP framework across the analysis process, and the variance in business, which uses the existing resource, that should be defined, reported and allowed, and wrong choices can be described as follows:

  • In option a, It described its action or a failure to alter, that's why it is wrong.
  • In option b, This technique fails the system, that's why it is wrong.
  • In option d, It combines the potential for social application, that's why it is wrong.
4 0
3 years ago
3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
ehidna [41]

Answer:  a) = 1.5 sec.  b= 11.5 m. c=0  d= 1.5 sec.

Explanation:

a) Once thrown into the air , the only influence on the ball is gravity, so, we can conclude that the acceleration acting on the ball is the one due to gravity, i.e., g= 9.8 m/sec².

Applying the definition of acceleration, we can write the following equation:

a= (vf-vo) / t   ⇒ g = vf-vo / t. (1)

Now, when the ball reaches to his maximum height, it stops momentarily, and then starts to fall, so for this height, we can write vf=0.

Replacing  in (1), and solving for t, we get:

t = (0 -vo) / g = -15 m/s/ - 9.8 m/sec² (Taking upward as positive  direction)

a) t= 1.5 sec.

Replacing this value in the kinematic equation for displacement, when vo=15 m/s, we get:

hmax: 15 m/sec . 1.5 sec -1/2. 9.8 m/sec². (1.5 sec) ² (2)

b) hmax= 11.5 m

c) vf= 0 (as explained above)

Finally, in order to know how long the ball takes to return to its initial height, we know that for the falling part of the trajectory, vo=0, so we can write the equation for displacement as follows:

h=-hmax (because it returns to the same starting point)= 1/2 gt²=-11.5 m

Solving for t, we get:

d) t=1.5 sec.

It can be seen that the time used in going up, it is the same for going down, to travel the same distance.

This result is completely general and applies to any free fall problem.

3 0
3 years ago
What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
Elenna [48]

Answer:

Explanation:

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.

Computer virus symptoms

How can you tell if a virus has slipped past your defenses? With some exceptions, like ransomware, viruses are not keen to alert you that they've compromised your computer. Just as a biological virus wants to keep its host alive so it can continue to use it as a vehicle to reproduce and spread, so too does a computer virus attempt to do its damage in the background while your computer still limps along. But there are ways to tell that you've been infected. Norton has a good list; symptoms include:

Unusually slow performance

Frequent crashes

Unknown or unfamiliar programs that start up when you turn on your computer

Mass emails being sent from your email account

Changes to your homepage or passwords

7 0
3 years ago
Other questions:
  • Match the spreadsheet features with their respective descriptions.
    7·2 answers
  • Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
    5·1 answer
  • Even though a high-level programming language
    11·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Netwo
    7·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
  • Complete the following sentence by choosing the best answer from the options listed below.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!