1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
13

A ____ is a software program written to change the behavior of a computer or other device on a network, without the permission o

r knowledge of the user.
Computers and Technology
1 answer:
Tems11 [23]3 years ago
5 0
Security filter app that filters the accessibility of things it deems inappropriate
You might be interested in
Using the College Registration example from Section 6.7.3 as a starting point, do the following:
andreev551 [17]

Answer:

Check the explanation

Explanation:

INCLUDE Irvine32.inc

TRUE = 1

FALSE = 0

.data

gradeAverage WORD ?

credits WORD ?

oKToRegister BYTE ?

str1 BYTE "Error: Credits must be between 1 and 30" , 0dh,0ah,0

main PROC

call CheckRegs

exit

main ENDP

CheckRegs PROC

push edx

mov OkToRegister,FALSE

; Check credits for valid range 1-30

cmp credits,1 ; credits < 1?

jb E1

cmp credits,30 ; credits > 30?

ja E1

jmp L1 ; credits are ok

; Display error message: credits out of range

E1:

mov edx,OFFSET str1

call WriteString

jmp L4

L1:

cmp gradeAverage,350 ; if gradeAverage > 350

jna L2

mov OkToRegister,TRUE ; OkToRegister = TRUE

jmp L4

L2:

cmp gradeAverage,250 ; elseif gradeAverage > 250

jna L3

cmp credits,16 ; && credits <= 16

jnbe L3

mov OkToRegister,TRUE ; OKToRegister = TRUE

jmp L4

L3:

cmp credits,12 ; elseif credits <= 12

ja L4

mov OkToRegister,TRUE ; OKToRegister = TRUE

L4:

pop edx ; endif

ret

CheckRegs ENDP

END main

3 0
3 years ago
What five safety habits are you using for the internet?
forsale [732]

Answer: Keep Personal Information Professional and Limited.

Keep Your Privacy Settings On.

Practice Safe Browsing.

Make Sure Your Internet Connection is Secure.

Be Careful What You Download.

Choose Strong Passwords.

Explanation:that’s what is think

4 0
3 years ago
What is composition
Dmitry [639]
The term composition in simple words is “putting together”. It is a thing composed of various elements.
4 0
3 years ago
Which of the following is best practice to minimize the chance of infecting your mobile device with malware
lawyer [7]
U Can use an anti virus, or do daily malware scans in ur device
7 0
3 years ago
The apparent magnitude of a star is the brightness of a star
Lana71 [14]
<span>c. as seen from the Earth without the effect of the atmosphere</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
    14·2 answers
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
    5·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • ❤️❤️❤️❤️❤️❤️❤️❤️IS THERE ANYONE'S STILL AWAKE?? HMM HEHE I'M HERE AGAIN~~~ FOLLOW ME FOR MOR3~~​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!