1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
4 years ago
9

A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con

nected to the network. (Hint: one word)
Computers and Technology
1 answer:
Darya [45]4 years ago
5 0

Answer:

Worm

Explanation:

This is what a worm does! It exploits small security holes in networks and computers.

You might be interested in
Distinguish between exponentiation and modulus. Be specific.
fredd [130]

Answer:

Exponentiation: Exponentiation is a mathematical operation involving raising a base to an exponent.

Modulo: The modulo operation finds the remainder after division of one number by another.

Explanation:

7 0
3 years ago
How can you tell that a website is valid and reliable?
larisa86 [58]
If there is an about page where it tells whom made the website, as well as a copyright 2016 on the bottom of the page. This basically means the website is useful and updated by the creators. Another factor which the site doesnt always need but if it has an https at the beginning of the url then it should be good and valid because that means the site is secured. Also factor in the sections where articles are present, if they have a date and an author towards the bottom or top of the article, then it can be trusted as well. Theres a lot more you can look for in a site and validating if it is an okay site but these are a few examples. Hope this helped!:)
3 0
3 years ago
Using hard disk space to temporarily store data or instructions from ram is referred to as the
madreJ [45]
*nix - swap partition
All OS's - swap file[s]
Windows - page file
5 0
4 years ago
Whenever you communicate online, remember a. to delete anything you don't want to keep b. everything you put online is available
maxonik [38]

Answer:

B-Everything you put online is available forever. Messages or photos will never be permanently deleted from memory cards on cameras or cell phones.

5 0
3 years ago
Add the following line of code to the end of your script, replacing any function calls: nested_sum( eval(input()) )
masha68 [24]

The program is an illustration of loops; Loops are program statements used for repetition of operations

<h3>How to complete the code?</h3>

The complete question is added as an attachment

The code written in Python that completes the missing parameters in the question are:

def nested_sum(mylist):

   total = 0

   for other_list in mylist:

       total += sum(other_list)        

   print(total)

   

t = [[1,2],[3],[4,5,6]]

nested_sum(t)

nested_sum( eval(input()))

Read more about loops at:

brainly.com/question/24833629

#SPJ11

8 0
2 years ago
Other questions:
  • Briefly explain the following terms and concepts:
    8·2 answers
  • What are indexes in a database?
    14·1 answer
  • The Gauss-Seidel method as an iterative technique often refers to an improved version of the Jacobi method, since the Gauss-Seid
    13·1 answer
  • The process of converting an input file (stream of characters) into an understandable format is called syntax analysis.
    7·1 answer
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • HELP ASAP!!<br> What is the difference between an internal event and an external event?
    10·1 answer
  • Please help
    5·1 answer
  • If you have an unstable investment and after 5 years you have 100 dollars less than you started with, is your IRR positive or ne
    14·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
  • Which ipconfig command switch would a technician use to display detailed information (such as dns servers and mac addresses)?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!