1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
4 years ago
7

A virus that attaches to an executable program can do anything that the program is permitted to do.

Computers and Technology
1 answer:
Reptile [31]4 years ago
7 0

Answer:

a) True

Explanation:

A macro virus infects executable portions of code. A virus that attaches to an executable program can do anything the program is permitted to.

Most use an Email for spreading macro viruses, which is a common method and is rather easy. Although, more advanced softwares trick people into giving personal information.

You might be interested in
A computer has dose not have ___________
Ksivusya [100]

Answer:

A computer does not have brain of its own

4 0
3 years ago
Read 2 more answers
What is a neuromorphic chip?
Dominik [7]

Answer:

A neuromorphic computer is a machine comprising many simple processors / memory structures (e.g. neurons and synapses) communicating using simple messages (e.g. spikes). ... Neuromorphic computing systems excel at computing complex dynamics using a small set of computational primitives (neurons, synapses, spikes).

Explanation:

The structure of neuromorphic computers makes them much more efficient at training and running neural networks. They can run AI models at a faster speed than equivalent CPUs and GPUs while consuming less power. This is important since power consumption is already one of AI's essential challenges.

3 0
3 years ago
What value(s) can be input into this code for the value of number that will cause the code in the loop to execute? Scanner keybo
Marianna [84]

Answer:

There is no value of the number variable, for which the loop can be true in any iteration.

Explanation:

  • The above loop states the condition that the value should be less than 100 and greater than 500. It is because the loop holds the and condition which gives the true if both conditions will be true.
  • The first condition of the while loop states that the value of the number variable is less than the 100.
  • The second condition of the while loop state that the value of the number variable is greater than the 500.
  • The and condition of the while loop will true if both conditions will true.
  • But there is no number which is less than 100 and greater than 500.
  • So no number can satisfy the while condition to be true.

5 0
4 years ago
A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops
Irina18 [472]

Answer:

D.

Explanation:

Based on the information provided within the one choice that will least likely impact the programmer's choice in design would be the frequency of a particular item occurring in a data set. This is because the system needs to be handle a large amount of data and be able to scale accordingly, regardless of how many frequent a particular item occurs.

4 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
Other questions:
  • When copying and pasting text, the first step is _____.
    10·2 answers
  • Pick 2 different operating systems and discuss how they can be used in daily operations.
    5·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were
    15·1 answer
  • Write a short note on Computer<br>impact on<br> our society?​
    7·2 answers
  • When you use the 3 bits 100 what color will it produce?<br><br> Computer Science
    11·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • The physical parts of Computer are kwon as<br>​
    15·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Differentiate between refraction of light and reflection of light
    8·2 answers
  • One limitation of high-level programming languages is
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!