1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
13

Which of the following is a malicious program that can replicate and spread from computer to computer?

Computers and Technology
2 answers:
Mama L [17]3 years ago
6 0
Virus be caz is only a virus can replicate itself while even if u try email it need a virus to replicate so if u wanted to pick email it had to be email virus then only the answer woulda be correct
Marina CMI [18]3 years ago
5 0
An email, duh!

lol j.k def not email, it is a virus.

a trick to remembering this is that a virus can make you and computer sick. 

You might be interested in
What stage of software development incorporates planning to help make changes in the project plan based of reviews
larisa86 [58]

Answer:

A

Explanation:

8 0
3 years ago
To complete a forensic disk analysis and examination, you need to create a ____.
just olya [345]
<span>To complete a forensic disk analysis and examination, you need to create a </span>report.
8 0
2 years ago
What data unit is addressed based on the IP address of the recipient?
erica [24]

Answer:

packet

Explanation:

7 0
3 years ago
PYTHON1.)Assume that price is an integer variable whose value is the price (in US currency) in cents of an item. Write a stateme
hammer [34]

Answer:

#part 1

#read the amount

amount=int(input("enter the amount:"))

#find the dollars

doll=int(amount/100)

// find the cents

cent=amount%100

#print output

print("{} dollars and {} cents.".format(doll,cent))

#part 2

#read a floating point

temperature=float(input("enter the temperature:"))

#part 3

#read a word

firstWord=input("enter a word:")

Explanation:

In part 1, read amount and the find the dollars with the help of "/" operator. Then find the cents with "%" operator and print both.In part 2, read a point and cast it to float then assign it to variable "temperature".In part 3,Read a word and assign it to variable "firstWord".

Output:

enter the amount:4321

43 dollars and 21 cents.

enter the temperature:12.5

enter a word:hello

3 0
3 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Other questions:
  • Which of the following statements is false?
    12·1 answer
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • If your database is in archivelog mode, how can you force an archive?
    7·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • Two strings, and , are called anagrams if they contain all the same characters in the same frequencies. For example, the anagram
    13·1 answer
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!