1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
4 years ago
13

Which of the following is a malicious program that can replicate and spread from computer to computer?

Computers and Technology
2 answers:
Mama L [17]4 years ago
6 0
Virus be caz is only a virus can replicate itself while even if u try email it need a virus to replicate so if u wanted to pick email it had to be email virus then only the answer woulda be correct
Marina CMI [18]4 years ago
5 0
An email, duh!

lol j.k def not email, it is a virus.

a trick to remembering this is that a virus can make you and computer sick. 

You might be interested in
Qué es que puede pasar lo mismo con la galaxia<br>​
White raven [17]

Answer:

If u need it to b translated: What can the same thing happen to the galaxy?

Explanation:

No sé, esa oración no tiene sentido

3 0
3 years ago
Is the internet a private place?
Ludmilka [50]
Hey there!

No, the internet is not a private place

I hope this helped! :-)
8 0
3 years ago
Read 2 more answers
1. Which of the following is a search engine?
Effectus [21]
<span>C)Google
D) Search engines often provide different results, even when you enter the same query.
</span>
6 0
3 years ago
Read 2 more answers
Answer all of the questions correctly and you will be amazing. Fill in Blanks
Naya [18.7K]
A.Chicken Street
B.You just got Vectored
5 0
4 years ago
Inputs to a system that can enhance performance is called
disa [49]
Inputs to a system that can enhance performance is called Resources
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement below correctly differentiates between frames and bits? Frames have more information in them than bits. Frames a
    10·2 answers
  • Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
    9·1 answer
  • g 18.6 [Contest 6 - 07/10] Reverse an array Reversing an array is a common task. One approach copies to a second array in revers
    8·1 answer
  • You create a new three-way mirror storage space. You format the storage space by using ReFS. Which two features can you use on t
    13·1 answer
  • Write a javascript program that reads three integers named start, end, and divisor from three textfields. your program must outp
    6·2 answers
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • Resumen sobres el correo electrónico​
    6·1 answer
  • As a sports store owner, the higher the price you charge for gear...
    8·2 answers
  • Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she i
    11·1 answer
  • after confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!