1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
6

Why did my typing suddenly become delayed, but then went back to normal a few minutes later. Is this spyware or smth?

Computers and Technology
1 answer:
Murljashka [212]3 years ago
7 0

Answer:

Socratic app

Explanation:

it will help you

You might be interested in
Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new vi
umka2103 [35]

Answer:

The total cost is $13.0

Explanation:

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.

Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer's video rentals.

The program should prompt the user for the number of each type of video and output the total cost.

8 0
3 years ago
What's wrong with this python code i don't know what's wrong with both of them
Evgesh-ka [11]

Answer:

Keep it in the format

first one:

def swapping_stars():

   line_str = ""

   for line in range(6, 8):

       for char in range(0, 6):

           if line % 2 == char % 2:

               line_str = line_str + "*"

           else:

               line_str = line_str + "-"

           print(str(line_str))

swapping_stars()

second one:

if you want it to go:

23456

def print_numbers(list):

   for i in range(1, len(list)):

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

if you want it to go

123456

def print_numbers(list):

   doneONE = False

   for i in range(1, len(list)):

       if not doneONE:

           print(str(list[i] - 1))

           doneONE = True

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

Explanation:

5 0
3 years ago
What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
Phoenix [80]

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

8 0
3 years ago
Beth wants to add information to her powerpoint presentation that is hiden from her audience and only she will see. Which featur
umka21 [38]

Answer:

She should use her "notes pane" in the PowerPoint

Explanation:

PowerPoint is a very good graphics software program available in different versions as a result of upgrades, with in-built functions which aid presentations of information in different formats such as text, videos, graphs in slides. It also allows printing into a hard copy.

Notes pane is a section in the PowerPoint software program located below the slide pane, in other words, it is a box found at the bottom of the slide. You write information in that box when you don't want the audience to see the information when they are viewing the slides during a presentation, giving Beth, for instance, the ability to still add some things that could assist her presentation.

7 0
4 years ago
13) Search engines and metasearch engines are examples of which network application?
olga2289 [7]
The correct answer here would be web services because you are utilizing it to find information that you need.
7 0
3 years ago
Other questions:
  • Question # 6
    13·1 answer
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • Agile methods typically use a ______ model, which represents a series of iterations, or revisions, which are based on user feedb
    7·1 answer
  • Hi Alaza, when you submit this form, the owner will be able to see
    12·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • In MS Word we can merga cells true or false​
    13·2 answers
  • Choose the term to complete the sentence.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!