1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
4 years ago
6

Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again

st computer viruses and ____ is essential for both individuals and businesses.
Computers and Technology
1 answer:
kondaur [170]4 years ago
7 0

Answer:

hackers

Explanation:

If there are two things computers should be protected from - especially if they continually connect to the internet - they are malicious programs such as viruses and their malicious human counterparts - hackers.

Computer viruses are malicious programs that integrate themselves into another program, replicate themselves and cause harms to system programs and resources by altering and/or destroying these programs. These viruses are mainly transmitted and spread by removable media devices and programs downloaded from the internet.

Hackers are unauthorized set of programmers that can break into a system, network and even applications in order to steal, alter or destroy them. The launch malicious programs via the internet into the system or network of systems.

You might be interested in
Which is a example of fixed expense <br><br> -food<br> -clothing<br> -entertainment<br> -rent
Artemon [7]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
6 0
4 years ago
Read 2 more answers
4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.
alexgriva [62]

Answer:

The <u>control</u> [Ctrl] key

Explanation:

While holding down left click and pressing control key it will copy to where you drag and drop it.

6 0
3 years ago
You can use any of the ____ comparison operators to control a loop.
anygoal [31]
Six. 

There are six comparison operators: 

The equals operator: ==
The not equals operator: !=
The greater than operator: >
The less than operator: <
The greater than or equal to operator: >=
The less than or equal to operator: <=
8 0
3 years ago
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
xz_007 [3.2K]
This is in fact false to my knowledge
4 0
4 years ago
What gonna happened if you put rice water in your hair
Nikitich [7]

Answer:

That does something?

Explanation:

(•_•)

<) )╯all the single ladies

/ \

(•_•)

\( (> all the single ladies

/ \

(•_•)

<) )╯oh oh oh

/ \

7 0
3 years ago
Other questions:
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • What kind of device is a printer? output or input
    13·1 answer
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • Which of the following are ways companies gather customer feedback?
    13·2 answers
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • 1st row has 3 possible answers software program, web page, and web browser
    8·1 answer
  • Which devices are managed through device management? Device management is the process of managing----(blank)-----devices.
    15·1 answer
  • What is the best way to show a complex data chart in word?
    6·1 answer
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!