1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
6

Are computer virus and human virus the same​

Computers and Technology
1 answer:
miss Akunina [59]3 years ago
6 0

Answer:

No not really

Explanation:

a virus in a computer is coding gone wrong which in our case if we have a virus it can be healed with medical addition.

You might be interested in
Why is it important not to leave your personal information on a public computer?
zheka24 [161]

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

7 0
2 years ago
Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does
swat32

A performance range simply means the threshold and maximum percentage of shares that may become earned.

<h3>What is a performance range?</h3>

Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.

It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.

Learn more about performance on:

brainly.com/question/26256535

5 0
2 years ago
Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.
zhuklara [117]

Answer:https://www.chegg.com/homework-help/questions-and-answers/program-specifications-write-program-play-automated-game-rock-paper-scissors-two-players-m-q84530098

3 0
2 years ago
Why should you follow-up with your interviewer after a job interview?
elixir [45]

B. To reinforce your interest in the position and thank your interviewer


8 0
3 years ago
Read 2 more answers
Reimplement StringSet with the exception that it should now extend ArrayList instead of encapsulating a String[]. You can easily
kolbaska11 [484]

Answer:

Here is the program for the given question

Explanation:

class StringSet

{

ArrayList<String> arraylist; //a reference variable of ArrayList of generic type String

//A no argument constructor.

public StringSet()

{

arraylist=new ArrayList<String>(); //instantiating the ArrayList object

}

//A mutator that adds a String newStr to the StringSet object.

void add(String newStr)

{

arraylist.add(newStr); // add(String) method to add string to the arraylist

}

//An accessor that returns the number of String objects that have been added to this StringSet object.

int size()

{

return arraylist.size(); // size() method which gives the number of elements in the list

}

//An accessor that returns the total number of characters in all of the Strings that have been added to this StringSet object.

int numChars()

{

int sum = 0;

for(String str:arraylist) //for-each loop; can be read as for each string in arraylist

{

sum+=str.length();

}

 

return sum;

}

//An accessor that returns the number of Strings in the StringSet object that have exactly len characters.

int countStrings(int len)

{

int count = 0;

for(String str:arraylist)

{

if(str.length() == len)

count++;

}

return count;

}

}

4 0
3 years ago
Other questions:
  • You listened to a song on your computer. did you use hardware or software? explain.
    15·1 answer
  • Which answer choice correctly distinguishes among the three pieces of data?
    13·1 answer
  • Match the appropriate color mode with the correct definition
    9·1 answer
  • Lisa has had her California real estate license suspended for violations involving mobile homes under the California Business an
    12·1 answer
  • Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c
    6·2 answers
  • Cryptography has requirements include:
    8·1 answer
  • ASAP BRAINLIEST!!!
    6·1 answer
  • If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
    11·2 answers
  • What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links v
    7·1 answer
  • What is the name of the device protected by a digital certificate?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!