1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
14

What damage can a virus do to your computer?

Computers and Technology
1 answer:
Lostsunrise [7]3 years ago
3 0

That depends on what it's programmed to do. Some common examples of damage are:

- Shutting down your computer

- Stealing information

- Decoding passwords


Hope it helped,


BioTeacher101

You might be interested in
C++ Fibonacci
liq [111]

Answer:

int ComputeFibonacci(int N) {

   if(N == 0)

       return 0;

   else if (N == 1)

       return 1;

   else

       return ComputeFibonacci(N-1) + ComputeFibonacci(N-2);

}

Explanation:

Inside the function ComputeFibonacci that takes one parameter, N, check the base cases first. If N is eqaul to 0, return 0. If N is eqaul to 1, return 1. Otherwise, call the ComputeFibonacci function with parameter N-1 and N-2 and sum these and return the result.

For example,

If N = 4 as in the main part:

ComputeFibonacci(4) → ComputeFibonacci(3) + ComputeFibonacci(2) = 2 + 1 = 3

ComputeFibonacci(3) → ComputeFibonacci(2) + ComputeFibonacci(1) = 1 + 1 = 2

ComputeFibonacci(2) → ComputeFibonacci(1) + ComputeFibonacci(0) = 1 + 0  = 1

*Note that you need to insert values from the bottom. Insert the values for ComputeFibonacci(1) and  ComputeFibonacci(0) to find ComputeFibonacci(2) and repeat the process.

4 0
3 years ago
To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso
Sladkaya [172]

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

7 0
3 years ago
Which of the following statements is true about biometrices as an authentication method
matrenka [14]

Answer:

what are the statements?

Explanation:

7 0
3 years ago
Consider a scenario in which you are trying to communicate to your parents that you should have a later curfew. Write a dialogue
Gemiola [76]

Explanation:

In this example, the scenario will be the fact that I have started high school. I believe that because of this, my curfew should be different. This is an example of a dialogue that would discuss this

Me: I need a later curfew I have so much things to do and don't have time to do what I want , i am 16 now.

Mom: no you need to go to bed early so you can do what you need not what you want.

Me:ok ,  make you happy for now but if you don't let me now I'm going to later this will cause experiences that I have never encountered later in life that I could know about sooner but couldn't because i was restricted and when I have less common sense then everyone when I'm older it's your fault

5 0
3 years ago
Read 2 more answers
Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
weqwewe [10]

Answer:

Declining free space on the hard drive

Explanation:

Although heat is one of the main factors that shortens the life of computer parts such as the central processing unit, the major cause of deterioration in computer performance are usually program build-up, too many files including video, music, and picture files, and other forms of viruses and malware and incompletely installed programs. This may eat up free space on the hard drive, which leads to slowness.

6 0
3 years ago
Other questions:
  • Convert A4B from hexadecimal to binary. Show your work.
    11·1 answer
  • Windows service accounts will use passwords consisting of at least
    14·1 answer
  • Discuss the software development methodology you would use for developing a software product for insurance agents, and state val
    10·1 answer
  • Which of the following are valid values for a String? (Select all that apply)
    7·1 answer
  • If you tap or click the increase font size button too many times and make the font size too big, you can tap or click the _____
    9·1 answer
  • Select the correct answer.
    5·1 answer
  • Discuss advantages and disadvantages of operating system
    8·2 answers
  • The advantages and disadvantages of internet​
    6·1 answer
  • The four differences between binary and denary​
    13·1 answer
  • How to get an object from a container in java.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!