1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
10

A person who creates a computer virus is called ​

Computers and Technology
2 answers:
ch4aika [34]3 years ago
8 0

Answer:

A person who creates computer virus is known as hacker.

Aliun [14]3 years ago
7 0

Answer:

A hacker is the answer of this question

You might be interested in
You have a bunch of text files in your home directory, and you are trying to find which ones contain the name "Backman". You are
Elodia [21]

Answer:

grep -i backman *

Explanation:

grep command is a unix command line utility that is use to search for plain text.

Running

grep -i backman *

command will bring back all occurrence of backman in the directory while ignoring the case whether it's upper or lower.

grep is the keyword

The -i means grep should ignore the case.

Then backman is the search word to find.

The wildcat (*) means all occurrence of backman should be returned.

6 0
3 years ago
How do you determine if a name is a variable holding a value or if it is a function call?
11Alexandr11 [23.1K]

The way to determine if a name is a variable holding a value or if it is a function call is by:

  • Instance variables are prefixed with self.

<h3>What is this call about?</h3>

A function call is known to be a kind of an expression that has the function name which is said to be accompanied by the function call operator, () .

Note that The way to determine if a name is a variable holding a value or if it is a function call is by:

  • Instance variables are prefixed with self.

See full question below

How do you determine if a variable in a method is an instance variable for the class?

a) Instance variables have leading underscores in their names.

b) Instance variables are prefixed with self..

c) Instance variables start with a capital letter.

d) all of the above

e) none of the above

Learn more about function call from

brainly.com/question/15071685

#SPJ11

5 0
2 years ago
How will you be assigned with a mailbox with any OSP
Leona [35]

Answer:

Go to the File tab and click Options.

Click on the Mail menu at the left.

Click on the Signatures button to open the Signatures and Stationary window.

In the Email Signature tab, click New.

Type in a name for the New Signature such as Shared Mailbox Signature and click OK.

Explanation:

3 0
3 years ago
PLz answer I really need the answer
zlopas [31]

Answer:

a

Explanation:

job leads

4 0
3 years ago
Read 2 more answers
Data warehousing is a(n) __________, and data mining is a(n) ____________.
Maksim231197 [3]

Answer:

B. Process, group of techniques

Explanation:

Data warehousing simply means storing large amounts of data from multiple sources to a central "warehouse" to be analyzed or simply stored for later. Data mining on the other hand involves discovering patterns in sets of data to make better decisions. Analyzing data with a group of techniques like statistics and machine learning.

8 0
3 years ago
Other questions:
  • Choose the true statement below. a. The content that displays in the browser is contained in the head section. b. The content th
    13·1 answer
  • While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea
    9·1 answer
  • Assuming x and y are variables of type float, the expression:
    6·1 answer
  • Can you see it now ivy97? I've posted it again.
    8·1 answer
  • How would you define media literacy?
    12·1 answer
  • Which kind of testing runs the system in a simulated environment using simulated data?a) validation testing. b) verification tes
    5·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain so
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!