1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
14

Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a

ntivirus software. what type of virus has he discovered?
Computers and Technology
1 answer:
Pavel [41]3 years ago
7 0
I think it is a Polymorphic Virus
You might be interested in
Which of the following statements about light-emitting diodes is correct
kipiarov [429]
The answer is A. LEDs <span>are used as indicators in circuits.</span>
5 0
4 years ago
Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
kotegsom [21]

Answer:

Select the arrow next to the bullet list option in the Paragraph group.

Explanation:

This allows you to decide what shape of bullets you would like to have.

Hope this helps!

Note: I personally recommend using stars :)

6 0
3 years ago
You use the _____ sheet in the format cells dialog box to position data in a cell by centering it, for example.​
Oliga [24]
You use the Alignment sheet in the format cells dialog box to position data in a cell by centering it, for example. Generally along the middle branch is a line or centerline of the definite pipeline on a scale of whatever is indicated.
3 0
3 years ago
A _____ provides a file-system interface which allows clients to create and modify files.
stiv31 [10]
The correct answer is a file-server system. Hope this helps!
3 0
4 years ago
Clickable text or images that take you to different sites on the World Wide Web are called __________.
andrew-mc [135]

they are called links my dear watson

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is not true about managing your privacy settings? (select all that apply)
    9·2 answers
  • Which activity constitutes legal computer activity?
    12·1 answer
  • The email administrator has suggested that a technique called SPF should be deployed. What issue does this address?
    5·1 answer
  • In python:
    8·1 answer
  • Write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be follo
    15·1 answer
  • Who could be involved in the murder of Mr Douglas​
    6·2 answers
  • Which platform is dedicated to Customer Relationship Management (CRM)?
    7·1 answer
  • HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
    9·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
  • What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!