1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
4 years ago
11

Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates

C. Negative coordinates D. X coordinates
Computers and Technology
2 answers:
iren [92.7K]4 years ago
8 0

Answer:

answer b

Explanation:

S_A_V [24]4 years ago
4 0
The correct answer is B
You might be interested in
Here's something random idc
melisa1 [442]

Answer:

ey ey

Explanation:

3 0
3 years ago
Read 2 more answers
All of the following are stages in the SDLC except _____.
Anni [7]

All of the following are stages in the SDLC except JAD. JAD is Joint Application Development.

Explanation:

  • JAD (Joint Application Development) is a methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops called JAD sessions.
  • The JAD approach, in comparison with the more traditional practice, is thought to lead to faster development times and greater client satisfaction, because the client is involved throughout the development process. In comparison, in the traditional approach to systems development, the developer investigates the system requirements and develops an application, with client input consisting of a series of interviews.
  • JAD is a process used in the life cycle area of the dynamic systems development method (DSDM) to collect business requirements while developing new information systems for a company.
  • The JAD process also includes approaches for enhancing user participation, expediting development, and improving the quality of specifications.
3 0
3 years ago
Which option in presentation software can you use to apply a “fly in” effect to the objects on a slide?
GarryVolchara [31]
The transition option in presentation software can be used to apply a “fly in” effect to the objects on a slide.
3 0
3 years ago
You want to catch a malware. However, the vile malware creator programmed it in a way that the body of such malware is encrypted
makvit [3.9K]

Explanation:

Antivirus software aims to detect, isolate and if necessary, delete malware on a computer before it can harm data. Antivirus software uses several techniques to identify malware – the two most common are known as signatures and heuristics.

Signatures

A malware’s signature is a distinctive pattern of data either in memory or in a file. An antivirus program may contain thousands of signatures, but it can only detect malware for which a signature has been identified and published by the antivirus program’s authors. As a result there is a period between a new piece of malware being released ‘into the wild’ and when its signature can be incorporated into antivirus products. During this period, the malware can propagate and attack unprotected systems, exploiting the so-called ‘zero day’ vulnerabilities that exist until the systems are fixed and antivirus signatures are updated. It is not uncommon for several variants of a malware program to be published at intervals, each sufficiently different that they possess different signatures.

A second weakness of signatures is that more sophisticated malware has the ability to change its program (it is said to be polymorphic or metamorphic), disguising itself without affecting its operation.

Heuristics

Complementing signatures, heuristics use rules to identify viruses based on previous experience of known viruses. Heuristic detection may execute suspicious programs in a virtual machine (a software recreation of a physical computer) and analyse the program for operations typical of known malware (such as replicating itself or attempting to overwrite key operating system files); or it might revert the program back to its original source code and look for malware-like instructions. If the heuristic analysis considers that the file acts in a malware-like manner, it is flagged as potentially dangerous.

Unlike signatures, heuristics do not require specific knowledge about individual types of malware – they can detect new malware, for which signatures do not exist, simply by their behaviour. The drawback of heuristics is that they can only draw conclusions based on past experience; radically new malware (which appears all too regularly) can pass unnoticed.

Issues with antivirus software

Although antivirus software is an essential part of protecting your computer, it is not a complete solution to malware problems.

Despite the best endeavours of its makers, antivirus software has occasionally proved to contain bugs with consequences like being inaccurate, failing to update itself or simply consuming huge amounts of computer power. Fortunately, these problems are rare, easily fixed and much less serious than the risk from a malware attack.

3 0
3 years ago
What is the importance of the international employment​
My name is Ann [436]

Answer:

People who went overseas to work can learn different skills and technologies which can be beneficial for the development of our own country.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following would determine how many elements are in values?
    15·1 answer
  • Which company has experienced censorship in China?
    13·2 answers
  • What area displays the title of the document
    6·1 answer
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply thos
    5·2 answers
  • What is your understanding about the subject “digital image processing”?
    14·1 answer
  • Your dad just gave you his old computer running Windows 7. You want to see how many volumes are contained within it. Which tool
    10·1 answer
  • What is meant by hacking in internet ?ASAP PLEASEEEE​
    5·1 answer
  • How many binary digits are in 10^100.
    13·1 answer
  • Dear Brainly, since you don't respond anyother way...
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!