1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai

t that the malware possesses?
a. Circulationb. Infectionc. Concealmentd. Source
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
4 0

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

You might be interested in
Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res
Andre45 [30]

Answer:

a variable of type "double" is more suitable for finding average because average could be any number with decimal places. we can't use a variable of type "integer" because it will omit the value after the decimal and will not produce satisfactory results.  

Explanation:

an example of C++ code is given to find the average of two numbers a and b

#include <iostream>;

using namespace std;

int main() {

double a = 2.334;

double b = 34;

double average =  (a + b) / 2;

cout << average;

return 0;

}

5 0
3 years ago
What are the XML technologies used in SOA?
saw5 [17]

Answer:

There are three technologies used for implementing the SOA most commonly with Web services are UDDI (Universal Description, Discovery & Integration) , WSDL (Web Services Description Language) and  SOAP (Simple Object Access Protocol) .

Out of them XML technologies are Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP).

WSDL is an XML language that describes a Web service.

SOAP is an XML Protocol and it is used by client application to communicate with web services.

8 0
3 years ago
What tasks do data entry macros commonly perform? Check all that apply.
Paha777 [63]

Answer:

test whether a user entered a value

3 0
3 years ago
Can someone help me do this who ever does it first get 100 points :)
omeli [17]

Answer:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Explanation:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

3 0
3 years ago
"The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of prevent
OlgaM077 [116]

Answer:

A: Suspended

Explanation:

I think sorry if it's wrong

8 0
3 years ago
Other questions:
  • Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
    13·2 answers
  • What can a parent do to help a child adjust to a new culture or area
    7·2 answers
  • PLEASE HELP
    15·2 answers
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • Write a Java class called BankAccount (Parts of the code is given below), which has two private fields: name (String) and balanc
    9·1 answer
  • Within a word processing program, predesigned files that have layout and some page elements already completed are called
    8·1 answer
  • Is the app scener safe? its a chrome webstore app on computer.​
    13·1 answer
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the stri
    8·1 answer
  • There is a development team delivering a new software package with agile and devops frameworks. in one of the releases, the auto
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!