1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
11

A new computer virus can enter the system through email or through the internet. There is a 30 % chance of receiving this virus

through email. There is a 40 % chance of receiving it through the internet. Also, the virus enters the system simultaneously through email and the internet with probability 0.15. What is the probability the virus does not enter the system at all?
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
6 0

Answer:

form 0% to 50%

Explanation:

You might be interested in
High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project
e-lub [12.9K]

Answer:

Portfolio management  is the correct option.

Explanation:

Project management software is that type of software that is used to accomplish the management related works such as planning, organizing, summarizing and many other works related to the management.

So, project management software is used for functioning the enterprise and portfolio management functions by which the employee combines and summarizes project information.

8 0
4 years ago
Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
professor190 [17]
False because if you edit the ownership of file it will give permissions only with the permissions you can edit file,rename,or delete file.
5 0
3 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
Which is the full form of COPA​
Radda [10]

Answer:

<u>COPA full form or meaning is Computer Operator and Programming Assistant.</u>

5 0
3 years ago
Read 2 more answers
Question 2 of 10
horrorfan [7]

Answer:

Lowest Level; Machine Language.

Explanation:

The lowest level of a computer is machine language, which are strings of 0's and 1's in bits, and it's possible to perform tasks at this level. It's however difficult to do and humans created <em>Assembly</em>; a type of low level programming language to be readable, and converts to machine language so that we don't have to work in binary.

4 0
2 years ago
Other questions:
  • Have you ever used a device that relies solely on the cloud?
    10·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Name some technologies that engineers create
    13·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • Select the recommended design practice that applies to a web site using images for main site navigation.
    7·1 answer
  • What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?
    13·1 answer
  • The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
    9·1 answer
  • 4. What is the difference between head tag and heading tag?​
    13·1 answer
  • 1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math.
    11·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!