1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
13

Witch of the following is a malicious program that can replicate and spread from computer to computer?

Computers and Technology
1 answer:
Papessa [141]3 years ago
4 0
The answer is A, a virus. Spam can become a virus but only if it tricks you into downloading something.

You might be interested in
Code example 5-1 import java.util.Scanner; import java.text.NumberFormat; public class WeightConverter { public static void main
Trava [24]

Answer:

It displays an error message from the getDouble() method

Explanation:

The above would be the result because of the following

1. Variable d is declared as a double variable and should be used as such.

2. The getDouble() method is also defined to handle double variables only.

When the program tries to accept at

weightInPounds = getDouble(sc, prompt);

The getDouble method is called immediately and since the value

"two hundred" entered in string, it can't handle this data type and it (the getDouble method) will display an error message

4 0
4 years ago
How does confidentiality protect people and their online activity?
zlopas [31]
The answer is C Explanation: process of elimination
5 0
3 years ago
What must devices that communicate with one another on the internet have in common?
Tomtit [17]

The most devices that communicate with one another on the internet have in common is Use the identical net protocols. Website IP addresses together with 74.125. 65.91 and 72.21.

<h3>What is the IP Address?</h3>

Every tool that communicates on the Internet, whether or not or not it's a non-public computer, a tablet, a smartphone, or something else, is assigned a completely unique figuring out range known as an IP (Internet Protocol) address.

Using the Internet, computer systems join and speak with one another, usually the usage of the TCP/IP (Transmission Control Protocol / Internet Protocol).

Read more about the internet :

brainly.com/question/1538272

#SPJ4

6 0
3 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
4 years ago
Software that interprets commands from the keyboard and mouse is also known as the
STALIN [3.7K]

Answer:

Operating System

Explanation:

Operating system is the basic software that helps different peripherals such as keyboard, mouse and printer etc. It is the most important software of computer or mobile devices. This help to manage all hardware devices, software and other resources connected to the computer.

Keyboard and mouse are the input hardware devices, so it is the main responsibility of operating system to interpret the command of these devices.

7 0
3 years ago
Other questions:
  • WILL MARK BRAINLIEST IF ANSWERED ASAP
    10·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • Plz help meeeeee QUICKLY!!! WORTH 15 POINTS!
    15·1 answer
  • Which of the three is not a popular cloud suite or online office suite?
    9·1 answer
  • (10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
    13·1 answer
  • What is the smallest negative integer that can be represented in two's complement system in which each value is represented by e
    7·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    8·2 answers
  • Can someone help on number 8? Plz
    14·1 answer
  • Which of the following can be used to help find the error
    8·1 answer
  • I'm doing a python assignment for my coding class, and the input part just isn't working, someone please help out and tell me wh
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!