1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
4 years ago
6

Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again

st computer viruses and ____ is essential for both individuals and businesses.
Computers and Technology
1 answer:
kondaur [170]4 years ago
7 0

Answer:

hackers

Explanation:

If there are two things computers should be protected from - especially if they continually connect to the internet - they are malicious programs such as viruses and their malicious human counterparts - hackers.

Computer viruses are malicious programs that integrate themselves into another program, replicate themselves and cause harms to system programs and resources by altering and/or destroying these programs. These viruses are mainly transmitted and spread by removable media devices and programs downloaded from the internet.

Hackers are unauthorized set of programmers that can break into a system, network and even applications in order to steal, alter or destroy them. The launch malicious programs via the internet into the system or network of systems.

You might be interested in
Hi who plays among us
Ray Of Light [21]

Answer:

Me

Explanation:

Lol

8 0
3 years ago
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
Match the function to its purpose.
schepotkina [342]

Answer:

  • Median :Calculates the average of the two  numbers in the middle of a set of even count of numbers.
  • Mode : This function shows the most frequently  occurring number in a set of numbers
  • Standard deviation : You can see how far each number  varies, on average, from the average  value of the list
  • Rank : With this function, you can determine  the position of a number in an  unarranged array or set.

Explanation:

8 0
4 years ago
How did the computer obtain its current ip address? how can you determine this
salantis [7]
Ip Adress is a one of a kind series of numbers isolated by periods that distinguishes every PC utilizing the Internet Protocol to convey over a system. These are the default setting when the PC can't discover a system and on the grounds that it is the Server's nearby IP.
4 0
4 years ago
Sanford is creating an excel spreadsheet and needs to insert many worksheets to organize his data. What is the limit of the numb
Varvara68 [4.7K]

Answer:

The answer is given below in explanation section.

Explanation:

As asked in the question Sanford is creating an excel spreadsheet and needs to insert many workbooks sheets to organize his data, then what is the limit of the number of worksheets excel con contain.

The excel spreadsheet contains as many worksheets as you want but it is limited by the available memory of your computer and system resources. If you have very little memory then you cannot create many worksheets. If you have memory in GBs then you can create thousands of worksheets.

However, it is noted that to create the worksheet is not limited by Excel but it is limited by avilabe memory and system resources. If you have enough computer memory and resources like CPU power etc, then you can create worksheet as many as you want.

It is also noted that the excel worksheet is limited by its number of rows and number of columns it contains e.g. the total number of rows and columns on a worksheet are 1,048,576 rows by 16,384 columns.

If you want to study more about Excel limitation and specifications, the following link may help you

https://support.office.com/en-us/article/excel-specifications-and-limits-1672b34d-7043-467e-8e27-269d656771c3

5 0
3 years ago
Read 2 more answers
Other questions:
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • Computer security:
    15·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • When you want to specify multiple criteria, and all criteria must be true for a record to be included in the results, when the _
    9·1 answer
  • Jimmy wrote the procedure scoreToGrade which accepts as a parameter score - a quiz score in the range 0-100. The procedure is su
    8·1 answer
  • When a person or organization uses the services of another professional, that person or organization is called the _______
    15·1 answer
  • Learning how to use word processing and spreadsheets, and creating presentations are all considered __________ computer skills.
    15·2 answers
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
  • Which phrases in the passage provide clues that trifling means "silliness” or "insignificance”? Check all that apply.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!