1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
12

While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Whic

h of the following types of viruses caused Neil's computer to crash? worms
encryption

logic bombs

spyware

adware
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
6 0

Answer:

logic bombs

Explanation:

logic bombs -

It consists of certain coding , which is put into the software and will perform certain malicious function at the very correct time, is known as logic bomb ,

they are also known as time bomb.

It is a time of virus , but gets activated as soon as all conditions are met , which is coded in to the software.

Hence , from the given scenario of the question,

The correct term is logic bomb.

You might be interested in
What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as o
lesantik [10]

Answer:

Answered below

Explanation:

Recursion refers to the process of a function calling itself within its own definition. It calls itself repeatedly until a base condition is met and the loop breaks.

The advantages of recursion over loops include;

A) Recursion reduces time complexity.

B) Recursion is better at tree traversal and graphs.

C) Recursion reduces the time needed to write and debug code and also adds clarity to code.

Disadvantages of recursion include;

A) Recursion uses more memory because each function call remains in stack until the base case is met.

B) Recursion can be slow.

C) Recursion

3 0
4 years ago
Create a float variable named diameter. This variable will hold the diameter of a circle. d. Create a float variable named PI.
Basile [38]

Answer:

float diameter=2*r; //hold the diameter of a circle

float PI; // float variable named PI.

Explanation:

Here we have declared two variable i.e diameter and PI of type float. The variable diameter will hold the diameter of a circle i.e  2*r  where r is the radius of a circle.

Following are the program in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

   float r=9.2; // variable declaration

float diameter=2*r; //hold the diameter of a circle

float PI=3.14; // float variable named PI hold 3.14

cout<<"diameter IS :"<<diameter<<endl<<"PI IS :"<<PI; // display value

  return 0;

}

Output:

diameter IS :18.4

PI IS :3.14

8 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Which BEST describes how the author’s purpose is revealed? A) The speaker appeals to the emotions of the audience in section 10.
tatiyna

You probably meant languge arts not Tech.

Anyways I will not be sure unless I read the book but..C most of the time is correct sooo sorry I can't help much unless I read the book

I would suggest <u>B) The speaker appeals to the emotions of the audience in section 9.</u>

<u />

I'm also sorry that I'm late but I hope someone else who searchs this up can use this

<u></u>

<u>Sorry If I'm wrong</u>

8 0
3 years ago
Https://pad let.com/pord0783/jb0rxah8u083xtnb
Nady [450]
I’m confused what do we do?
8 0
3 years ago
Read 2 more answers
Other questions:
  • Operating software is a must in every software (a) True (b) False
    8·1 answer
  • Which two pieces of information must be provided when saving a file for the first time in Wordpad?____.
    8·1 answer
  • Information systems that support the sales process of B2C companies are typically Web storefronts that customers use to enter an
    11·1 answer
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter.
    12·1 answer
  • What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B
    8·1 answer
  • Which strategies for effective presentations is Ian using in his opening? Check all that apply.
    8·2 answers
  • Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. Wh
    7·1 answer
  • When a module is processed:
    6·1 answer
  • Commercials are short media advertising that persuades a consumer to buy/use their product/service?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!