1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
6

A(n) _____ is a computer program that can damage files and programs on your computer.

Computers and Technology
2 answers:
andrew11 [14]3 years ago
8 0

Answer:

computer virus is the correct answer.

Explanation:

  • A computer virus is a program that gets loaded in a computer system without any information and once it is loaded to the user system it has the potential to destroy the data and damage the files present in the computer.
  • A computer virus can multiply and duplicate itself and it can also delete the data existing in the hard drive in the most critical scenario.
  • There are various kinds of computer viruse such as email viruses, worm, etc.
igomit [66]3 years ago
5 0
It is virus. cause virus is a computer programme.

You might be interested in
A yellow inspection tag on a scaffold means the scaffold has been inspected and
kodGreya [7K]

Answer:CAUTION

Explanation: on edg

7 0
2 years ago
After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to
patriot [66]

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
5 0
3 years ago
Much like the SysV init daemon, the Systemd init daemon is used to start daemons during system initialization as well as start a
Alexxx [7]

Answer:

True

Explanation:

Closely related to the init daemon, the systemd is a daemon in itself that is directly or indirectly  responsible for other deamons. it start other daemons during system boots up as well as start and  stip them after booting. it is also the first and last daemon during system processes.

3 0
3 years ago
Difference between TIFF and BMP
Lina20 [59]

Answer:

Both TIFF and BMP are bitmap files, but TIFF files contain tags with additional information, like color space, resolution and print size, and can have 16-bit/channel depth (BMP's are limited to 8 bit). Taking a step back, there's no significant problem with first-generation JPEG files which use moderate compression.

Explanation:

4 0
3 years ago
Which category of utility tools prepares documentation on a PC that would likely be included in a site installation notebook?
alekssr [168]

Answer:

System Information.

Explanation:

The system information prepares the documentation on a PC that would likely be included in a site installation notebook.

In other words system information provides a quick way to get the information or details of the system.

You can open system information if you have windows 7 or 10 search System information in start.

5 0
3 years ago
Other questions:
  • How do I turn of the noise canceling feature on my beats studio wireless?
    13·1 answer
  • Give a recursive version of the algorithm Insertion-Sort (refer to page 18 in the textbook) that works as follows: To sort A[1..
    12·1 answer
  • Select the correct answer.
    5·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • Why are the READ and DATA statements used<br>together?​
    10·1 answer
  • Which network component blocks status?
    9·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • When a single controller device communicates with multiple peripheral devices, what wires are simultaneously connected to all de
    10·1 answer
  • Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!