1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
11

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa

y a computer operates, and that can replicate itself to infect any new media it has access to.
Computers and Technology
1 answer:
g100num [7]3 years ago
8 0
That would be a virus.
You might be interested in
12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the
NemiM [27]

Answer:

<em>Good Luck!</em>

Explanation:

6 0
2 years ago
Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
storchak [24]
A. most significant bit
5 0
3 years ago
Devices designed primarily to be used with a company network are called
MrRissso [65]
Devices designed primarily to be used with a company network are called thin clients. 
8 0
3 years ago
Netflix suggestions ?
hjlf

Answer:Lost in space

Explanation:It is a great space movie do not watch if your scared

3 0
3 years ago
Read 2 more answers
Someone plzzzz help me
IgorC [24]

Answer:

Data base

Explanation:

Database holds all your information.

8 0
3 years ago
Other questions:
  • Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe
    14·1 answer
  • In a computerized accounting system, each transaction that is analyzed must be entered by hand into the appropriate journal and
    12·2 answers
  • To change a chart's data series, make the chart active, then in the data group on the chart tools design tab, click the _____ bu
    9·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1
    10·1 answer
  • Select the answer that best describes the activity
    5·2 answers
  • How can volunteering yo help plan fundraiser for your team or club be a way to develop your strengths?
    13·1 answer
  • A finally clause will execute:
    8·1 answer
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!