1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
13

A virus enters a computer or network _____.

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
5 0

Answer:

Security

Explanation:

A virus enters a computer or network " Security " .

You might be interested in
Codehs dartboard 3.12.4
allsm [11]

Answer:

Whats the question?

Explanation:

7 0
3 years ago
What are rules that we use on the internet called, and what are some of them?
dusya [7]
Like safety rules like what to do privacy, plagarizim, and  cyberbullying and what not. Just stuff like that.
5 0
3 years ago
A written guarantee to fix or replace an item is called a _____.
VladimirAG [237]
A warranty is a statement given by the manufacturer or other company
3 0
4 years ago
Read 2 more answers
What is general charactersristics of the ethiopan physiograhy​
inessss [21]
The major physiographic features are a massive highland complex of mountains and plateaus divided by the Great Rift Valley and surrounded by lowlands along the periphery. The diversity of the terrain is fundamental to regional variations in climate, natural vegetation, soil composition, and settlement patterns.
8 0
2 years ago
Flash drives plug into a(n) _
Alecsey [184]
A flash drive plugs into a USB Port
7 0
3 years ago
Read 2 more answers
Other questions:
  • Describe a function that would take in any RGB value and double its intensity. What do you think happens if the input is 200, 22
    8·1 answer
  • Common input devices include the keyboard, ____, and integrated video cameras.
    12·1 answer
  • Two technicians are discussing fully charged battery voltage readings. technician a says that it should read approximately 12.6v
    8·1 answer
  • 3. An open source software operating system<br> TYPE THE ANSWER
    11·1 answer
  • Using examples, evaluate the open source model of software development. In your discussion highlight some of its advantages and
    12·1 answer
  • Organizations must protect their sensitive information through digital security measures and their _____ through physical securi
    13·2 answers
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • This is a while loop question for Information technology.
    11·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!