1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
3 years ago
13

A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app

lications is called a ____.
Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0

Answer:

macro virus

Explanation:

schepotkina [342]3 years ago
6 0

Answer:

macro virus

Explanation:

Macro virus -

A micro virus is written in a micro language  , where the programming language is present in the application of software like the powerpoint , excel , microsoft office , word processor , etc.

These virus gets activated as soon as the file is opened and then the virus starts to spread all over the system .

The virus may be send via email , and as soon as the file is opened , the macro virus gets activated.

Hence, from the given information of the question,

The correct term is macro virus.

You might be interested in
Quick Search lets you refine or narrow your search results using links on the right side of the screen. Do a search on nano-mate
Fofino [41]

Answer:

C. by topic.

D. by collection.

4 0
3 years ago
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
Under the ____________________, federal agencies must 1) review their IT systems for privacy risks, 2) post privacy policies on
nadya68 [22]

Answer:

E-Government Act of 2002.

Explanation:

The E-Government Act of 2002 is a statute of the United States of America which was enacted by the 107th U.S Congress on the 17th of December, 2002. The E-Government Act of 2002 was signed into law to facilitate the management and promotion of the US government processes and services, as well as enhance transparency and accountability between the government and the public through the application of internet-based information technology.

Under the E-Government Act of 2002, federal agencies must;

1. Review their IT systems for privacy risks.

2. Post privacy policies on their websites.

3. Post machine-readable privacy policies on their websites.

4. Report privacy activities.

3 0
2 years ago
The endocrine system is composed of many parts of the body.<br> a)True<br> b)False
Finger [1]
It is a) true because its compouse by organs and body tissues
4 0
2 years ago
Read 2 more answers
In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
Marta_Voda [28]

Answer:

The correct answer is D) 1 Million

Explanation:

It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.

Cheers!

4 0
3 years ago
Other questions:
  • Which of the given original work is protected by the copyright law
    14·2 answers
  • True or False?
    5·1 answer
  • Peripherals can be used to output information.<br> True<br> False
    9·2 answers
  • How can ascii be used to represent characters in computer system
    7·1 answer
  • I wonder how world is created
    12·2 answers
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • When computing the cost of the basket of goods and services purchased by a typical consumer, which of the following changes from
    11·1 answer
  • What does a production proposal provide ?
    7·2 answers
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!