1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
5

What is the name of the virus that appears to be a legitimate program?

Computers and Technology
1 answer:
timurjin [86]3 years ago
3 0
A virus or malware appearing/pretending to be a legitimate program is called a Trojan. 
You might be interested in
Self-contained sequences of actions to be performed are: (1 point)
beks73 [17]
These are functions.
6 0
3 years ago
Read 2 more answers
Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments
gulaghasi [49]

Answer:

def doMyMath(n):  

    if n == 1:  

         return n  

    else:  

         return n*doMyMath(n-1)  

Explanation:

This line defines the function

def doMyMath(n):  

This line checks if n is 1. If yes, it returns n (1)

    if n == 1:  

         return n  

If otherwise, it calculates the fibonacci recursively

    else:  

         return n*doMyMath(n-1)  

To call the function from main, you can use:

print(doMyMath(5))

or

num = int(input("Number: "))   --- This gets the number from user

print("Result: ",doMyMath(num)) --- This calculates the factorial

<em>This question is answered in Python</em>

6 0
3 years ago
A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
evablogger [386]

Answer:

OKKKkkkkkkayyyy

3 0
3 years ago
Which option allows you to link to a specific slide in another presentation?
tresset_1 [31]
The power-point option for new slide. or maybe duplicate slide.
3 0
4 years ago
what is the most state-of-the-art computer network Hardware in terms of power, integration, and merging?
Vika [28.1K]
Apple is the most state of the art computer
5 0
3 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • What is one advantage of top-down programming design?
    13·2 answers
  • is the process of creating a message to be communicated. a. Encoding b. Decoding c. Receiving d. Sending
    10·2 answers
  • The media literacy movement hopes to _____.
    15·2 answers
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • How does having weak security on your browser represent the weakest link in a network
    8·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    7·1 answer
  • What is binary number system? Why is it used in computer system?
    13·2 answers
  • HELP!!!!!!!
    8·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!