1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
3 years ago
12

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p

rogram designed to do harm a type of software designed to track activity online
Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
4 0

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

You might be interested in
Which is NOT a type of SD card?
andre [41]
I'm pretty sure the answer is B.

SD SC can held up to 2GB capacity

SDHC can held up to 32 GB

SDXC (eXtended) can held up to 2TB

SDIO is an interface for I/O devices, there are cameras with this standard.
6 0
4 years ago
Read 2 more answers
Give a big-O estimate for the number of operations,
Kazeer [188]

Answer:

Explanation:

For the first iteration of i for loop 1 to n, the j for loop will run from 2 to n times. i.e. n-1 times.

For the second iteration of i for loop, the j for loop will run from 3 to n times. i.e. n-2 times.

From the third to the last iteration of i for loop, the j for loop will run n-1 to n times. i.e. 2 times.

From the second to the last iteration of i for loop, the j for loop will run from n to n times. i.e. 1 time.

For the last iteration of i for loop, the j for loop will run 0 times because i+1 >n.

Hence the equation looks like below:

1 + 2 + 3 + ...... + (n-2) + (n-1) = n(n-1)/2

So the number of total iterations is n(n-1)/2.

There are two operations per loop, i.e. Comparison and Multiplication, so the iteration is 2 * n(n-1)/2 = n ^2 - n

So f(n) = n ^ 2 - n

f(n) <= n ^ 2 for n > 1

Hence, The algorithm is O(n^2) with C = 1 and k = 1.

6 0
4 years ago
How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
DochEvi [55]
It's has six electrons because of it's atomic number
5 0
4 years ago
Read 2 more answers
Which of the following is NOT an example of a font style?
erastovalidia [21]
C. Underline because it is not a kind of font. it is an effect.
3 0
3 years ago
What are the methods or permissions needed to view the passwords for linux and unix?
Greeley [361]
Anybody can read encrypted passwords, they can't decipher them they're encrypted with a one way encryption algorithm.
4 0
4 years ago
Other questions:
  • The salespeople at hyperactive media sales all use laptop computers so they can have easy access to important data on the road.
    9·1 answer
  • Post secondary education refers to:
    13·1 answer
  • If after a run of arc consistency during the backtracking search we end up with the filtered domains of *all* of the not yet ass
    12·1 answer
  • What are the examples of shareware?
    9·2 answers
  • Which tcp/ip troubleshooting command should you use to determine whether a client and server are communicating with each other?
    7·1 answer
  • The Internet raises the bargaining power of customers most effectively by: making information available to everyone. reducing ba
    15·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • Your computer science teacher asks you to sample a black and white image that is 4” x 6”. How would you sample the image to prov
    10·1 answer
  • Question #2
    8·2 answers
  • Marcus traded in his 10-year-old truck for a new one. Because it is the first new truck he
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!