1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
10

What would happen if your computer was infected with the virus or if your network went down?

Computers and Technology
2 answers:
prohojiy [21]3 years ago
8 0

It will make your computer do multiple things it could close you out entirely or it could cause major lag and make it easier to hack into

tatuchka [14]3 years ago
5 0

Your computer will programs more slowly, when you go to an anti-virus software, for some, it will block you from allowing you to access the application. Your information may be stripped from your computer, allowing the infection to take your personal identity and money.

You might be interested in
Calvin is creating a 3D shell of a turtle. He is creating a sculpted, intricate design for the pattern he wants on the shell, bu
PSYCHO15rus [73]
A is right I did this
7 0
2 years ago
How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either
True [87]

Answer:

Following are the solution to this question:

Explanation:

In the following forms, RXS can appear:  

R X S \_ \_ \_  \_ it may look like that really, 4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ R X S  \_ \_  \_ it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_  \_  R X S \_  \_ it may look like that really, 4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ \_ \_  R X S \_ it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

\_ \_ \_ \_ R X S it may look like that really,  4 \times 3  \times 2  \times 1 forms = 24 may construct the remainder of its letters.  

And we'll have a total of 24 \times 5 = 120 permutations with both the string RXS.

In the following forms, UZ can appear:

U Z \_ \_ \_ \_\ _  They can organize your remaining 5 characters through 5 categories! Procedures = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ UZ \_ \_ \_ \_ They can organize your remaining 5 characters through 5 categories! Procedures = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ U Z \_ \_ \_They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_ U Z \_ \_They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_ \_ U Z  \_ They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

\_ \_ \_  \_ \_ U Z They can organize your remaining 5 characters through 5 categories! Procedures  = 5 \times 4 \times  3 \times 2 \times 1 = 120

There may be 120 \times 6 = 720 ways of complete permutations.

5 0
3 years ago
Write a program that will predict the size of a population of organisms. The program should ask the user for the starting number
sineoko [7]

Answer:

// using c++ language

#include "stdafx.h";

#include <iostream>

#include<cmath>

using namespace std;

//start

int main()

{

 //Declaration of variables in the program

 double start_organisms;

 double daily_increase;

 int days;

 double updated_organisms;

 //The user enters the number of organisms as desired

 cout << "Enter the starting number of organisms: ";

 cin >> start_organisms;

 //Validating input data

 while (start_organisms < 2)

 {

     cout << "The starting number of organisms must be at least 2.\n";

     cout << "Enter the starting number of organisms: ";

     cin >> start_organisms;

 }

 //The user enters daily input, here's where we apply the 5.2% given in question

 cout << "Enter the daily population increase: ";

 cin>> daily_increase;

 //Validating the increase

 while (daily_increase < 0)

 {

     cout << "The average daily population increase must be a positive value.\n ";

     cout << "Enter the daily population increase: ";

     cin >> daily_increase;

 }

 //The user enters number of days

 cout << "Enter the number of days: ";

 cin >> days;

 //Validating the number of days

 while (days<1)

 {

     cout << "The number of days must be at least 1.\n";

     cout << "Enter the number of days: ";

     cin >> days;

 }

 

 //Final calculation and display of results based on formulas

 for (int i = 0; i < days; i++)

 {

     updated_organisms = start_organisms + (daily_increase*start_organisms);

     cout << "On day " << i + 1 << " the population size was " << round(updated_organisms)<<"."<<"\n";

     

     start_organisms = updated_organisms;

 }

 system("pause");

  return 0;

//end

}

Explanation:

6 0
3 years ago
In order to estimate the percentage of defects in a recent manufacturing batch, a quality control manager at Intel selects every
Bezzdna [24]

Answer:

systematic sampling method

Explanation:

Based on the information provided within the question it can be said that in this scenario the method that was used was a systematic sampling method. This method focuses on selecting elements from a ordered sampling frame, which in this case refers to every 8th chip starting from the 3rd. This method repeats once the end of the list or process is reached which is 140 chips in this scenario.

7 0
3 years ago
We learned that an ideal multiple access protocol has FOUR desirable
Nataly [62]

Answer:

We learned that an ideal multiple access protocol has FOUR desirable

characteristics, describe them.

Explanation:

1.- Very experienced technology and easy to implement.

2.- Rigid resource management and unfit for variable traffic flows.

3.- Requires antenna duplexer for duplex transmission.

<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously. </em>

4.- Normally FDMA is combined with multiplexing FDD.

<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks. </em>

<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>

4 0
4 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • What are the four basic operating principles of the information processing cycle?
    7·2 answers
  • Which software application can best help teachers determine their students' average grades?
    5·2 answers
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?â
    11·1 answer
  • Plymouth Colony was originally founded by a group of people called Pilgrims. Since Plymouth did not have an official charter fro
    15·1 answer
  • How many dog breed are there
    9·2 answers
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • You must write a pseudocode process called swapSort which should sort a list of numbers using an algorithm called swap sort.
    13·1 answer
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!