1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
10

How many different Microsoft Windows file types can be infected with a virus?

Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
6 0
Phishing, scam, Fraud, just to get to hack your computer.
You might be interested in
Can someone urgently help me with my java code? Ive been working on it for hours and its not working.
Paha777 [63]

Answer:

nm hn hhjjnjjnj j

Explanation:

kjnjnjn jnjubhvcfv

3 0
3 years ago
For a policy to become enforceable, it must meet five criteria, which are?
Karolina [17]

A policy must be distributed, evaluated, understood, consistent, and followed in order to be enforceable.

What is enforceable?

A legally enforceable right of set-off is one that is valid and recognized in all situations (ie enforceable both in the normal course of business and on the default, insolvency or bankruptcy of one of the counterparties).

Distribution denotes that the policy has been made accessible to all personnel for the evaluation process (through events or notification). The second condition defines the content's readability, taking into account the challenges faced by speakers of foreign languages and complex terms (using simple and precise wording to remove uncertainty).

Understanding the terms of the policy is tested through comprehension, and uniform application of the policy is assessed through consistency. Finally, compliance denotes agreement among all parties to abide by the rules.

Learn more about enforceable policy click here:

brainly.com/question/26984272

#SPJ1

8 0
2 years ago
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
vovangra [49]

Answer:

protection of sensitive information

Explanation:

6 0
3 years ago
A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
Ierofanga [76]

Answer:

ToolBox.

Explanation:

A label control may be added to a form by double-clicking on the Label control icon in the ToolBox window.

5 0
3 years ago
______A computer program may only be constructed in a high level language. (T/F)
NeTakaya

Answer:

False.

Explanation:

A computer program can not only constructed in a high level language but also in low level language such as assembly language used for microprocessor for ex-8085 microprocessor,8086 microprocessor ,ARM assembly language and there are many more.

High level languages are programmer friendly they are easily understood by the programmers because they uses english words while low level languages are difficult because they uses binary language 0's or 1's.

Hence the answer to this question is False.

5 0
4 years ago
Other questions:
  • Reserve space in memory for a variable called UIN of size word. The initial value of UIN will be the sum of the digits in your U
    6·1 answer
  • What is the difference between a fiber optic cable and a twisted pair cable?
    5·1 answer
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • Write a class named RetailItem that holds data about an item in a retail store. The class should store the following data in att
    15·1 answer
  • Communication is defined as__________.
    10·1 answer
  • Writing the E-mail:
    5·1 answer
  • Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time.
    6·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
  • You are designing software for elderly people. Which two features can you
    6·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!