1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
3 years ago
5

When performing actions between your computer and one that is infected with a virus which of the following offers no risk becomi

ng infected
Computers and Technology
1 answer:
Mama L [17]3 years ago
6 0

Going to need your answer choices

thanks :)

You might be interested in
Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
patriot [66]

Answer:

Classification.

Explanation:

Classification is the wide field of data mining apps that analyzes data and establishes rules for making a distinction in specified classes.

Data mining is a method that corporations use to transform the raw information into valuable information. Corporations can understand something about their clients through using technology to identify trends in large quantities of info to create more successful marketing campaigns, increase revenue and reduce costs.

6 0
3 years ago
Five aplications of ict​
Irina18 [472]

Answer:

MS Word, MS Excel, MS PowerPoint, Adobe Photoshop, Adobe Reader

Explanation:

8 0
3 years ago
This decision control structure enables the program to execute a statement or block of codes if and only if the Boolean expressi
eduard

Answer:

Both if-then and switch is the decision control structure that enables the program to execute a statement or block of codes

Explanation:

This decision control structure always checks for one or more condition and execute true statement “if the condition is true” otherwise it will execute false statement (if present). The “true statement” is compulsory.

In case of “if-then loop”, it executes the true block only if the Boolean expression is true. In a similar way in switch-case, the same happens and instead of else part there will be a “default” statement which is compulsory to be present and it will get executed.

8 0
3 years ago
Which one of these is a mem?
sweet [91]
If you are referring to a meme then the answer would be B. This is because memes are pictures that spread throughout the internet. The answer choice A would be a username. I was not able to find anything on the word mem that relates to computers but I did learn that it is the 13th letter of the Hebrew alphabet.
8 0
3 years ago
Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
liq [111]

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

  • The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  
  • It is widely used in the data driven applications.
  • The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

5 0
3 years ago
Other questions:
  • Write a program that declares an array of size 1,230 and stores the first 1,230 prime numbers in this array. The program then us
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?
    7·1 answer
  • Achieves integration through several different types of software that sit between and provide connectivity for two or more softw
    11·1 answer
  • You are developing open-source software based on existing source code developed by someone else. What is the term for the piece
    9·1 answer
  • I am a mouse, but im not a mouse.<br><br> What am I?
    12·1 answer
  • Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You
    10·1 answer
  • You are the IT administrator for a small corporate network. The network uses a DHCP server for IP address configuration for most
    13·1 answer
  • When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to
    6·1 answer
  • Suppose you have 10 image files, each taking up 300 KB. About how many MB of space do they take up
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!