1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai

t that the malware possesses?
a. Circulationb. Infectionc. Concealmentd. Source
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
4 0

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

You might be interested in
Now write a program named GreenvilleRevenue that prompts a user for the number of contestants entered in last year’s competition
ss7ja [257]

Answer:

The c# program is given below.

using System;

class GreenvilleRevenue  

{

   static void Main() {

       // variable declared and initialized simultaneously

       int fees = 25;

       int last, present, rev;

       Console.WriteLine( "Enter the number of contestants participating in last year’s competition " );

       last = Convert.ToInt32(Console.ReadLine());

       Console.WriteLine( "Enter the number of contestants participating in this year’s competition " );

       present = Convert.ToInt32(Console.ReadLine());

       Console.WriteLine( "Number of Participants in last year's competition  \t\t" + last);

       Console.WriteLine( "Number of Participants in present year's competition   \t" + present);

       rev = present*fees;

       Console.WriteLine( "Revenue expected in this year’s competition is \t\t\t$" + rev );

       if(last < present)

           Console.WriteLine( "Participants are more this year" );

       else if(last > present)

           Console.WriteLine( "Participants are less this year" );

       else if(last == present)

           Console.WriteLine( "Participants are same both years" );

   }

}  

OUTPUT

Enter the number of contestants participating in last year’s competition  

111

Enter the number of contestants participating in this year’s competition  

123

Number of Participants in last year's competition    111

Number of Participants in present year's competition    123

Revenue expected in this year’s competition is   $3075

Participants are more this year

Explanation:

This program takes input from the user. The input is not validated as this is not mentioned in the question.

1. An integer variable is declared and initialized by the fees of this year’s competition.

2. Integer variables are declared to store participants for last year, present year and revenue earned in the present year.

3. User enters the number of participants in last year’s competition.

4. User enters the number of participants in this year’s competition.

5. All the input from the user is displayed.

6. The revenue earned in this year’s competition is computed and displayed.

7. The message is also displayed whether number of participants this year is greater or not than the last year.

8. Also, if participants are same in both years, the message is displayed accordingly.

6 0
4 years ago
What are three good things and three bad things about the metal pewter
Setler79 [48]
Good things:
It is a solid material,NOT plated which makes it easily engravable.
does not tarnish or
discolor easily

Bad things:
It is not a high quality metal
It will melt at low temperatures,so do not get it around extreme heat.
It can damage easy if exposed to acids like lemon juice or vinager


4 0
4 years ago
This device is used to connect sections of large networks?
ryzh [129]
Monster energy boissss
6 0
3 years ago
Read 2 more answers
Arrange the steps involved in natural language generation.
Firdavs [7]

Answer:

1. accessing content from some knowledge base.

2. picking words and connecting them to form sentences.

3. setting the tone and style of the sentence.

4. mapping the sentence plan into sentence structure.

Explanation:

Natural language generation can be defined as a part of artificial intelligence (AI) which typically involves developing responses by an AI in order to enable the computer engage in a useful conversation.

This ultimately implies that, the computer has to generate meaningful data (phrases and sentences) from the internal database.

Basically, the steps involved in natural language generation in a chronological order are listed below;

1. Text planning: accessing content from some knowledge base.

2. Picking words and connecting them to form sentences

3. Sentence planning: setting the tone and style of the sentence.

4. Text realization: mapping the sentence plan into sentence structure.

4 0
3 years ago
The clock interrupt handler on a certain computer requires 2ms (including process switching overhead) per clock tick. The clock
salantis [7]

Considering the situation described above, the fraction of the CPU execution that is devoted to handling clock interrupts "<u>12 percent</u>."

<h3>CPU Execution process.</h3>

The process of CPU Execution involves the execution of an instruction which in life fetches an instruction from memory through its ALU to carry out an operation and then saves the result to memory.

To illustrate the fraction of the CPU execution that is devoted to handling clock interrupts, we have:

60 × 2 msec = 120 msec ÷ 1 sec = 12 percent.

Hence, in this case, it is concluded that the correct answer is <u>12 percent CPU</u> devoted to the clock.

Learn more about the CPU execution here: brainly.com/question/14400616

4 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • In Microsoft Excel graphs are referred to as ______?
    14·2 answers
  • What is the circular motion that the earth makes in its orbit around the sun
    14·1 answer
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
    10·2 answers
  • a webmaster can be hired as a contract labor for a company meaning they are not an employee of the company true or false
    5·2 answers
  • In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
    7·1 answer
  • Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option.
    5·1 answer
  • Why should you be chosen over someone else? *
    5·2 answers
  • Que elementos han impactado las computadoras en la sociedad?​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!