1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
13

True or False The term virus and malware may be used interchangeably.

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
4 0

Answer: True

Explanation: they have similar definitions

You might be interested in
Hi um... i just wanna say hi :P
trasher [3.6K]
Lol Heyy , how are you
4 0
2 years ago
Read 2 more answers
Which f the following is not a characteristic of igneous rock
Ne4ueva [31]

Answer:

There are no answers but here is how you classify one with these characteristics so if its not on here probably that one hope this helps :)!

Explanation:

Igneous rocks are formed when melted lava or magma cools and crystallizes, and their unique traits are based on this process. They are strong because their mineral grains grow together tightly as they cool, and their minerals are usually black, white, or gray. They have a texture similar to something baked in an oven, like black bread or peanut brittle.  Some of the main minerals in igneous rocks are feldspar, quartz, olivine and mica. The size of the minerals depends on the depth of the magma that formed the rock. Deeper magma cools more slowly and forms larger crystals. Rocks that cool over a few months have microscopic mineral grains and are called extrusive. Rocks that cool over thousands of years have small to medium grains and are called intrusive. Rocks that cool over millions of years have large pebble sized grains and are called plutonic.  Granite and basalt make up the majority of igneous rocks. Basalt is dark and fine-grained with minerals rich in magnesium and iron. It is either extrusive or intrusive and is the primary rock on the ocean floor. Granite is light and coarse-grained and rich in feldspar and quartz. It is plutonic and less dense than basalt. Granite is found nearly everywhere beneath the continents.  The word "igneous" comes from the Latin word "fire" and is related to the melting process that forms these rocks.

3 0
2 years ago
National ISPs usually offer fewer services and have a smaller technical support staff than regional ISPs.
choli [55]

Answer:

um not sure

Explanation:

5 0
3 years ago
Help asap dont answer with a link​
dezoksy [38]

Answer:

90

Explanation:

dur nearly all my friends and family knows that

4 0
3 years ago
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
Other questions:
  • *****NEED HELP ASAP!!!! COMPUTER HELP!!!! PLEASE!**
    13·1 answer
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • What is the value of variable num after the following code segment is executed?
    5·1 answer
  • We already know that we can create a lunar lander application of the pipe-and-filter architecture style from three independent J
    6·1 answer
  • What are the disadvantages of using pointers?
    6·1 answer
  • What key value does Accenture’s myConcerto bring to clients looking for automated solutions?
    6·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • How to use emojis on chromebook without on-screen keyboard
    14·1 answer
  • In what way, if any, are problems related to conflicts? Problems and conflicts are the same thing. Problems and conflicts are th
    9·1 answer
  • While conducting routine maintenance, you discover a network server that needs to
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!