Answer:
1. Artwork of the child participants can be displayed as Picture.
Explanation:
The Art work is painting and filling different colors in different images and objects. Child make different pictures of homes, objects, fruits and vegetables and then colored them accordingly. This type of art work is displayed as picture. This work could not be displayed in the form of tables and lists and also could not shown as graphics.
Answer:
2. The changing image of public transportation is displayed as Graphics.
Explanation:
In Graphics, different images has been designed on different tools by graphic designers to display some problem and its solution in visuals. Different tools are there to make visuals. Changing image of bus transportation is also a transition from old transport system to new transportation system. So, it should displayed in the form of graphics.
Answer:
Illustrative comparison of data from the year 2010-2013 can be displayed in the form of word tables and lists.
Explanation:
In tables and list different data has been placed in specific order for the purpose of analysis of data. These tables are also designed to compare different values and things. So, the data from the year 2010-2013 can be displayed in the form of tables and list so that it can be compared and analyze from different aspects.
Answer:
A downloaded executable file may contain harmful software know as malware.
Further details:
Malwares:
Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.
Uses:
Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.
Answer details:
Subject: Computer and technology
Level: College
Keywords:
• Harmful software
• Malware
• Malware software
• Uses of malware
• Purpose of malware
Learn more to evaluate:
brainly.com/question/4997492
brainly.com/question/4010464
brainly.com/question/1754173
<span>Cyclos is a project of STRO, a leading organisation on monetary innovations. Cyclos offers a complete on-line payment system with additional modules such as e-commerce and communication tools. [ [ The Cyclos platform permits institutions such as local banks and MFI`s to offer banking services that can stimulate local trade and development. Cyclos is also used by many organizations and</span>
Well, it is safe to turn a computer on without a RAM, but you can't really do it. RAM is one of the essential components in computers without which you can't really use a computer. You can turn it on, however, nothing will appear on your screen and the system won't boot. So, technically, it is safe, but it won't do anything to your computer as it cannot run without RAM.