1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
6

Are computer virus and human virus the same​

Computers and Technology
1 answer:
miss Akunina [59]3 years ago
6 0

Answer:

No not really

Explanation:

a virus in a computer is coding gone wrong which in our case if we have a virus it can be healed with medical addition.

You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
4 years ago
Write a program that will make a copy of a text file, line by line. Read the name of the existing file and name of the new file(
Luba_88 [7]

Answer:

To find the text file, use a full path name when entering the file name, such as

C:\textfiles\StateCapitals.txt

You can save typing in the full path name by putting the file in the project directory, such as in

C:\Users\me\Documents\NetBeansProjects\Project4

3 0
3 years ago
Choose the word pair that would best complete this analogy <br> annihilation : obliteration
iogann1982 [59]
Annihilation : obliteration

if the choices were:

strategy : tactics
sensation : numbness
deliberation : impulsiveness
endeavor : quit 

Then the word pair that would best complete the analogy is:
STRATEGY : TACTICS

Annihilation and obliteration are synonymous. In fact, annihilation is defined as complete destruction or complete obliteration. Obliteration is defined as total destruction.

Strategy and tactics are also synonymous. They both mean a system or mode of procedure or a plan of action.

The rest of the choices are antonyms.
8 0
3 years ago
1. My grandma and I went shopping to look for old
docker41 [41]

Answer:

uncommon

Explanation:

it's not common or usual because no one else finds the things

it's not kind because inanimate objects don't show feelings

6 0
2 years ago
WHAT ARE THE RISK OF DUST​
Step2247 [10]

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

3 0
3 years ago
Other questions:
  • James wishes to access a certain software service via different computing systems over the Internet. What technology provides so
    13·2 answers
  • Programs which tell the computer what to do:<br> a. Software<br> b. ROM<br> c. RAM<br> d. Hard disk
    6·2 answers
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • What is computer software
    8·2 answers
  • Weak Induction
    8·1 answer
  • Select the correct answer.
    13·2 answers
  • Can you help me match the ships to the right number?​
    12·1 answer
  • WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also
    11·1 answer
  • HELP ME PLEASE <br> Can you help get back my ro blox account: (LOLCrashForce)
    15·2 answers
  • Reflection image and design
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!