1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
4 years ago
7

A virus that attaches to an executable program can do anything that the program is permitted to do.

Computers and Technology
1 answer:
Reptile [31]4 years ago
7 0

Answer:

a) True

Explanation:

A macro virus infects executable portions of code. A virus that attaches to an executable program can do anything the program is permitted to.

Most use an Email for spreading macro viruses, which is a common method and is rather easy. Although, more advanced softwares trick people into giving personal information.

You might be interested in
Look at the graph. What is the meaning of the point shown with a star
RUDIKE [14]
The answer is B. 1 Box= 1/2 Pounds
4 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
3 years ago
Concept of national sovereignty was established by the
Eduardwww [97]

Answer:

Explanation:

Thomas Hobbes. He was the one who provided the term with its modern meaning.

7 0
4 years ago
Whats difference between DCE AND DTE serial interface
harina [27]

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

7 0
3 years ago
If you ping a device, you are using the______protocol
meriva
Joystick..................:-)
6 0
4 years ago
Other questions:
  • Ill give Brainliest!!!!! I REALLYYY NEED HELP
    14·2 answers
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • Is a computer an input output or storage
    14·1 answer
  • What devise did george stbitz contribute?
    13·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • What is the output of this program? age=4 if age &gt;5: print (“more”) else: print (“less”)
    7·1 answer
  • The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
    8·1 answer
  • Differentiate between symmetric and asymmetric encryption
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!