1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
9

What does a spam e-mail normally promise you?

Computers and Technology
1 answer:
nlexa [21]3 years ago
7 0
The answer is a virus
You might be interested in
create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
Kobotan [32]

Answer:

success = -10 <= number <= 10

Explanation:

I check that -10 is less than or equal to number, and number is less than or equal to 10.

8 0
3 years ago
Java-Script Concept quiz:
In-s [12.5K]

Answer:

Explanation:

1) the versions of JavaScript that are fully supported by all modern browsers ( Except internet explorer 9) are:

C. ECMAScript 3, ECMAScript 5

2) JavaScript is used to implement complex features on a_____

A. web page

3) computer programming tools that are used to store data are called____

C. variables

4) var name = Scott; is the code to create a ____ called "Scott"

D. None of the above

Scott is a variable

5) the key difference between "var" and "let" variables is that____

D. None of the above  

let is used to redefine a variable by using var to redefine may cause problems

6) Hoisting in JavaScript is the process whereby declarations get moved to the____

C. top

7) Im JavaScript, "/ /" is used to code____

A. comments

8) ______ data types have two potential values - true and false.

D. None of the above

Boolean is the data type and null is always false

9) Using ____ gives coders the ability to query data set data to create blueprints.

C. consoles

The Console object provides access to the browser's debugging console.

5 0
3 years ago
Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
Papessa [141]

Answer:

He finished at 2:40 P.M.

Explanation:

This is because 80 minutes= 1 hour and 20 minutes. Add 1 hour and 20 minutes to 2:40, which equals 4:00.

7 0
3 years ago
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
hammer [34]

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

   cin>>inpt;

   vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

   size_t found = vect.at(i).find(ch);  

       if (found != string::npos){

           cout<<vect.at(i)<<" ";

           i++;

       }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

<em>for(int i =0;i<len;i++){ </em>

<em>    cin>>inpt; </em>

<em>    vect.push_back(inpt); } </em>

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

   size_t found = vect.at(i).find(ch);  

If found:

       if (found != string::npos){

Print out the vector element

           cout<<vect.at(i)<<" ";

And move to the next vector element

           i++;

       }

}  

4 0
3 years ago
Examples of 15 viruses in computer
Zepler [3.9K]
Computer Viruses:

Morris Worm
Nimda
ILOVEYOU
SQL Slammer
Stuxnet
CryptoLocker
Conficker
Tinba
Welchia
Shlayer

Anti-viruses:

Esafe
Avast
Avira AntiVirus
e Trust Antivirus
Dr Web by
NOD32
F-Secure Antivirus
AVG Anti-virus
.Kaspersky Antivirus
McAfee Antivirus
eScan
PC-Cillin
Symantec Antivirus
8 0
2 years ago
Other questions:
  • Information technology is the study of managing, processing, and retrieving information.
    5·1 answer
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t
    6·1 answer
  • Suppose arraylist list1 is [1, 2, 5] and arraylist list2 is [2, 3, 6]. after list1.addall(list2), list1 is __________.
    8·1 answer
  • Which of the following is NOT considered a step in the problem solving process. A Try B Discover C Prepare D Define
    12·1 answer
  • Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
    11·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • True or False? Using your traffic analytics report, you can see the source of traffic to your website
    13·1 answer
  • what is example of application of machine learning that can be imposed in eduction. (except brainly.)
    9·1 answer
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!