1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
3 years ago
9

Which of the choices Sean are not true when considering virus behavior

Computers and Technology
1 answer:
marusya05 [52]3 years ago
7 0
I don't think this is an complete question could you put an image of the problem
You might be interested in
In this lesson you wrote code to make the turtle draw squares. Briefly describe how the code for
ale4655 [162]

Explanation:

that programming language you must use?

3 0
3 years ago
Please answer the following essay question:
MArishka [77]
Advertising is a paid promotion that uses strategic planning to target a certain audience. The seven functions of marketing is promotion, selling, product management, marketing information management, pricing, financing, and distribution. Usually you see common advertising such as digital ads, billboards, newspapers, flyers, and more. Advertising can spread awareness, popularize a brand, increase customer demand, and company profits. Advertising is necessary for most- if not all- companies including media outlets, the television industry, search engine companies, and social media websites.
8 0
3 years ago
Which of the following is FALSE? Select one: a. The fast-paced and collaboration-based business environment makes email less use
12345 [234]

Answer:

The Atos case demonstrates that it is possible to cut out e-mail entirely.

Explanation:

6 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Game Design Help please
vova2212 [387]

Because, to put it simply, to use more complicated shapes requires more processing power which is unnecessary. Only if they would touch all parts of the shape should it be complicated.

5 0
3 years ago
Other questions:
  • Briefly explain the benefits and consequences of technology. //PLEASE ANSWER//
    9·1 answer
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • A _____ describes two or more computers connected to each other.
    6·2 answers
  • What are the text or graphics that are lighter than the main text located in a document's background called?
    10·1 answer
  • WILL MARK BRAINIEST
    12·1 answer
  • . What is piracy? ???????????????????​
    5·1 answer
  • Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly comp
    15·1 answer
  • Write a complete method from the client perspective that duplicates each element in place in a ListInterface object. For example
    8·1 answer
  • What should you consider when developing your website content?​
    6·2 answers
  • The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,OR
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!