1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
10

Which program can damage your computer? can cause damage to my computer.

Computers and Technology
2 answers:
Crazy boy [7]3 years ago
4 0

Answer:

Any virus that is a worm or a trojan will attack your computer

Explanation:

svetlana [45]3 years ago
3 0

Answer:

Malware is designed to cause damage to a stand alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.

Explanation:

You might be interested in
Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
Nina [5.8K]

Answer:

Apple users tend to like the company and love its products. Apple has successfully nurtured this Affective component of its customers' attitudes.

Explanation:

There are three component of attitudes, they include the behavioral component, the affective component and the cognitive component.  

The affective component of attitude is concerned about the emotional response attached to an attitude.  The affective component  involves a person’s feelings / emotions about the attitude object.  i.e it is basically concerned with the emotional reaction of a person or customer to a particular object or good.  

Hence, apple users liking the company and loving its products shows that Apple has successfully nurtured the affective component of its customers' attitude.  

4 0
3 years ago
Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
riadik2000 [5.3K]
I think it's better to have multiple folders because for say you have 6 school subjects but only have 1 folder how are you going to keep track with all 6 subjects in one folder ? You could use each folder for each subject which would save you a lot of time when it comes to getting out your complete work .You can have one folder such as "Workspace" and have multiple different sub-folders that relate that to "Workspace". Also if you store pictures in a folder, it might be a good idea to separate them into different sub-folders.
3 0
4 years ago
How is modern technology developed? Explain.
vivado [14]

Answer:

Modern technology has developed

Explanation:

The development of technology may draw upon many fields of knowledge, including scientific, engineering, mathematical, linguistic, and historical knowledge, to achieve some practical result. ... For example, science might study the flow of electrons in electrical conductors by using already-existing tools and knowledge.

4 0
3 years ago
Read 2 more answers
What might be some challenges if you’re trying to design a product for someone
ValentinkaMS [17]

Answer:

failure

Explanation:

if someone dosnt like it

4 0
3 years ago
Read 2 more answers
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
4 years ago
Other questions:
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • In a paragraph of no less than 125 words, describe how technology helps business professionals to be more efficient. Include exa
    12·2 answers
  • Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in
    5·1 answer
  • Who has access to the source code of proprietary software
    6·1 answer
  • Write a class called Line that represents a line segment between two Points. Your Line objects should have the following methods
    8·1 answer
  • Any material that comes into contact with the body must be __________.
    6·1 answer
  • Convert the decimal integer, 353.87510 to each of these forms:
    9·1 answer
  • 20 points for ez question lol
    9·2 answers
  • What online resource would you use if you wanted to read a review about a new movie?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!