1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
14

Which type of virus includes protective code that prevents outside examination of critical elements?

Computers and Technology
1 answer:
Vlad1618 [11]3 years ago
5 0

Answer:

Armoured viruses

Explanation:

Armoured viruses are computer viruses that have been found to be very dangerous, Armoured viruses ar designed to protect itself against any attempt to detect or trace Its activities. They have different ways through which they bypass antivirus software applications in a computer system, making it very difficult to eliminate from an infected system.

You might be interested in
ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
romanna [79]

Answer:

The answer to this question is Yes it is possible

Explanation:

It can be done In the case where a special server is required in each network that would forward the request to the  remote ARP(Address Resolution Protocol) server and will receive the response from the server and send it to the requesting host.So we conclude that we can do that hence the answer is Yes.

5 0
3 years ago
Ask the user to input their grade percentage (e.g. the use will enter 98 if they had an overall grade of 98% in their course) fo
Airida [17]

Answer:

In Python

def getpointValue(subject):

   if subject >= 75:        point = 4; grade = 'A'

   elif subject >= 60:        point = 3; grade ='B'

   elif point >= 50:        point = 2; grade = 'C'

   elif point >= 40:        point = 1; grade = 'D'

   else:        point = 0; grade = 'F'

   return point,grade

subjects= ["Accounting","Marketing","Economics","MIS"]

acct = int(input(subjects[0]+": "))

mkt = int(input(subjects[1]+": "))

eco = int(input(subjects[2]+": "))

mis = int(input(subjects[3]+": "))

acctgrade = getpointValue(acct)

print(subjects[0]+" Grade: "+str(acctgrade[1]))

mktgrade = getpointValue(mkt)

print(subjects[1]+" Grade: "+str(mktgrade[1]))

ecograde = getpointValue(eco)

print(subjects[2]+" Grade: "+str(ecograde[1]))

misgrade = getpointValue(mis)

print(subjects[3]+" Grade: "+str(misgrade[1]))

totalpoint = (acctgrade[0] + mktgrade[0] + ecograde[0] + misgrade[0]) * 3

gpa = totalpoint/12

print("GPA: "+str(gpa))

Explanation:

<em>The solution I provided uses a function to return the letter grade and the point of each subject</em>

<em>I've added the explanation as an attachment where I used comment to explain difficult lines</em>

<em />

Download txt
6 0
2 years ago
Difference and similarity between cluster computing and Hadoop ecosystem?<br>​
Marysya12 [62]
  • Some things can be similar and still have some differences. The Hadoop ecosystem is known to be the add-ons that make the Hadoop framework more better for some particular big data needs and tastes.

The Hadoop ecosystem is made up of the open source projects and commercial tools that are often optimized to act on different kinds of work especially to big data. It is very flexible

The differences is that cluster is simply a combination of a lot of computers that is set up to work together as one system but a Hadoop cluster is a cluster of computers that is used only at Hadoop. Hadoop clusters are set up to analyze and storing large amounts of unstructured data only in a distributed file systems.

Learn more about systems from

brainly.com/question/10603992

7 0
2 years ago
Read 2 more answers
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications
guapka [62]
The answer is multitasking. This is when the OS always programs to share resources to run at the same time.

If the applications were running on separate CPUs, then it would be multiprocessing.
3 0
2 years ago
Other questions:
  • 16.50. Suppose we have a sequential (ordered) file of 100,000 records where each record is 240 bytes. Assume that B = 2,400 byte
    11·1 answer
  • Which two keys on the keyboard allow an access user to move the insertion point to the next field to the right in datasheet view
    11·1 answer
  • 18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
    14·1 answer
  • Which is said to be ‘computer on a chip’
    8·1 answer
  • 9. What is composition? Why is composition important?
    11·1 answer
  • Which line of code will find the first occurrence of a three in an array?
    5·2 answers
  • # 12/9/2020
    13·1 answer
  • Drag each tile to the correct box.
    9·2 answers
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!