1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
11

A new computer virus can enter the system through email or through the internet. There is a 30 % chance of receiving this virus

through email. There is a 40 % chance of receiving it through the internet. Also, the virus enters the system simultaneously through email and the internet with probability 0.15. What is the probability the virus does not enter the system at all?
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
6 0

Answer:

form 0% to 50%

Explanation:

You might be interested in
HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
joja [24]

The primary key is the block under the Movie ID column.

The Field is the Movie Name.

The Record is the block that goes with the first row of data.

The Table is the bottom block in the center.

4 0
3 years ago
Read 2 more answers
What is a coverage map used for
erastova [34]

Answer/Explanation:

A coverage map shows how much land something takes up or reaches to.

4 0
3 years ago
Read 2 more answers
1
raketka [301]

1

they were crafted in stained-glass art in religious buildings

2

puzzle games

3

motion-capture devices (e.g., Kinect, WiiMote

4

puzzle

simulation

5 0
3 years ago
What has a code that is freely available for use or modification?
liq [111]

Answer:

Open source software

Explanation:

Open source software is exactly what you think it is, the code to compile the software and run it is available to the public for use or modification.

6 0
3 years ago
What is the best application to create a slide show presentation?
Lynna [10]

Answer:

Microsoft Windows File Manager

5 0
3 years ago
Read 2 more answers
Other questions:
  • .) Write a complete C program in one file which takes a double value from the user, cubes it, and prints the result. Your progra
    10·1 answer
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • Take some time to do some research about small businesses in your area. Select one and using HTML design a simple site that educ
    11·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • What is the command to list the contents of directors in Unix- like operating system
    10·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • What do you mean by flow of program​
    6·1 answer
  • GOOD EVENING, FRIENDS, I WANT TO ASK ON THE ACCOUNT OF HIS NAME‏BENJEMIN360 . THIS ANSWERS ARE VERY WONDERFUL, BUT I CAN'T COMMU
    6·1 answer
  • The users, groups, and roles that have access to a server are called ______________________________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!