1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
15

___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Computers and Technology
1 answer:
Firlakuza [10]3 years ago
3 0

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

You might be interested in
Suppose you have a stack ADT (i.e., an Abstract Data Type that includes operations to maintain a stack. Design a flowchart or su
Whitepunk [10]

Answer:

One approach would be to move all items from stack1 to stack2 (effectively reversing the items), then pop the top item from stack2 and then put them back.

Assume you use stack1 for enqueueing. So enqueue(x) = stack1.push(x).

Dequeueing would be:

- For all items in stack1: pop them from stack1 and push them in stack 2.

- Pop one item from stack2, which will be your dequeue result

- For all items in stack2: pop them from stack2 and push them in stack 1.

Hope it makes sense. I'm sure you can draw a diagram.

5 0
3 years ago
In 25 words or fewer, identify what calendar feature the recurring task function copies.
alexdok [17]
Shhsnanwnwnsjssnsnnwnsn
7 0
4 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
Which of the following would you classify as workplace violence? A. A co-worker tells you that you’ve got a great body and shoul
aev [14]
I believe it should be C, since it has the most immediate threat to your safety. 
8 0
3 years ago
Read 2 more answers
The special operator used to check whether an attribute value matches a given string pattern is _____.
RoseWind [281]

Answer:

The answer is LIKE

Explanation:

4 0
3 years ago
Other questions:
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Where do you access the status report of an assigned task that is open?
    12·2 answers
  • Write an if-else statement with multiple branches. If givenYear is 2101 or greater, print "Distant future" (without quotes). Els
    15·2 answers
  • write a java program that prompts the user to enter scores (each number an integer from 0 to 10) and prints the following output
    13·1 answer
  • What is output? x=-2 y=-3 print (x*y+2)
    10·1 answer
  • What online server provides you space to store and launch your website?
    11·1 answer
  • Which option correctly describes a DDMS application?
    6·1 answer
  • What are 5 different google g-suite tools that you can use to collaborate and communicate with othe
    15·1 answer
  • Can someone help me?
    14·1 answer
  • PLEASE HELP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!