1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
7

A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.

worm c. virus d. logic bomb
Computers and Technology
1 answer:
igomit [66]3 years ago
6 0

Answer:

B Worm

Explanation:

A worm infects personal files, and sometimes Operating System files required to start your computer and duplicates while (usually) trying to remain hidden.

You might be interested in
Over time, programming languages have evolved in phases called ________.
Tju [1.3M]
Programming Languages have evolved in phases called generations.  The five generations of computers are : <span>First Generation (1940-1956) Vacuum Tubes. Second Generation (1956-1963) Transistors. Third Generation (1964-1971) Integrated Circuits. Fourth Generation (1971-Present) Microprocessors. <span>Fifth Generation (Present and Beyond) Artificial Intelligence.</span></span>     
6 0
3 years ago
Read 2 more answers
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigating to the _____
Marina86 [1]
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigation to the master page.
7 0
4 years ago
Read 2 more answers
What is a basic operation of computers
ruslelena [56]
What is the context of the question? With all that you have provided my best guess would be "computational function/solving"
8 0
3 years ago
Which of the following is true for an API? I. Allows different devices to connect with each other II. Allows for Interactivity b
Zina [86]

Answer:

All of the above.

Explanation:

API is an acronym for application programming interface and it can be defined as a software intermediary (computing interface) comprising of sets of codes, tools and protocols that helps software applications and the computer to communicate with each other, as well enable the exchange of data. Some examples of popular APIs are Go-ogle, Face-book, Twitter etc.

The main characteristics and functions of an application programming interface (API) includes;

I. Allows different devices to connect with each other.

II. Allows for Interactivity between devices and software.

III. Messenger program that takes requests and delivers the response back to the user.

IV. Allows the creation of applications that access the features or data of an operating system, application, or other services.

V. Specifies how software components should interact.

VI. Used when programming graphical user interface (GUI) components

6 0
3 years ago
Which of the following is not a benefit of normalization?
mixer [17]

Answer:

The answer is option (4) Maximize redundancy as normalization minimizes redundancy of data.

Explanation:

Normalization of databases leads to minimization of data redundancy in databases. It doesn't maximize data redundancy. Data redundancy leads to wastage of resources. Normalization of databases minimizes insertion anomolies. Normalization of databases minimizes deletion anomolies. Normalization of databases minimizes updation anomolies.  So , the answer to the question is option (4) maximize redundancy.

8 0
3 years ago
Other questions:
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • How do u change the level of education on Brainly. cuz i just finished elementry
    9·2 answers
  • When assembling a desktop computer you should always install the drives before the motherboard?
    9·1 answer
  • Semiconductors are only somewhat conductive electronic components.<br><br> True or False?
    14·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
    14·2 answers
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set as
    5·1 answer
  • What are horizontal and vertical page break? how and where are these inserted?​
    10·1 answer
  • Taking a group of recipes and identifying the similarities is an example of _____.
    13·1 answer
  • What is a simple definition for electricity?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!