1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
14

Hey, anyone like will u jus help meh like pleaseee

Computers and Technology
2 answers:
Ksivusya [100]3 years ago
5 0

Answer:

1. Spyware.

Explanation:

Sure... pls give another person brainliest...

love u ❤️

hope it helps

jeyben [28]3 years ago
3 0

Answer:

1

Explanation:

You might be interested in
The file extension for Access 2007 and 2010 database filenames is .accdb. What is the file extension for older versions of Acces
Vikentia [17]
<span>The earlier file format was the .mdb file format. If a person has a file that is stored in the .mdb format and gets a new version of Access or needs an upgrade, he or she may choose not to upgrade due to the fact that he or she will not be able to make design changes to the .mdb file.</span>
4 0
4 years ago
Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
kolbaska11 [484]

Answer: Decoupling action of the process address space refers to the physical memory of the device getting decoupled to provide  address translation in automatic way. The benefit of this method is as follows:-

  • Faster starting up of the program
  • The physical address space gets managed on its own
  • Helps in execution of large program when the main memory of the machine is of  smaller size in comparison with program

7 0
4 years ago
The physical devices that make up a computer system are called
LUCKY_DIMON [66]
The question is broad and vague, but I would say hardware.
3 0
4 years ago
what is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulate
Soloha48 [4]

A honeypot is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion.

What is software?
Software is a grouping of computer programmes, along with auxiliary data and files. In contrast, hardware is the foundation upon which a system is built as well as what actually does the work. Executable code is the lowest level of programming and is made up of machine language instructions that are supported by a single processor, usually a central processing unit (CPU) or even a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent processor instructions that alter the previous state of the computer. One effect that is not immediately visible to the user is when an instruction modifies the value kept in a specific storage location in the computer.

To learn more about software
brainly.com/question/28224061
#SPJ4

4 0
1 year ago
Which best describes a career that would rely on both and employer and the federal government for funding? Electro-Mechanical Te
Dmitrij [34]

Answer:

<u>University Research Professor</u>

Explanation:

A university Professor can identify a research in his/her area of study and prepare a proposal for funding.This could be a research that will impact the nation thus a proposal could be presented to the federal government for funding. Additionally, the Professor can present the same proposal to the university research department to request funding of the project.The University which employed the Professor will now fund that project research and make it public to members of the community about the research that the University is undertaking with the professor as the leader of the research.

8 0
4 years ago
Other questions:
  • An LPN/LVN has transferred to a nursing unit and arrives for the first day. The RN checks with the LPN/LVN often throughout the
    11·1 answer
  • Which of the following will affect the size of your monthly mortgage payment? A The size of your down payment B The length of yo
    5·1 answer
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • The only type of donation you can make to a not for profit is to donate money
    10·1 answer
  • Which of the following is not a responsibility of a member of society?
    14·1 answer
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • Please Help me no links.
    6·1 answer
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • What is the correct sequence in which a computer operates​
    6·1 answer
  • I'm having trouble with an assignment of mine. I'm making a text based adventure game for extra credit in my class and I'm stuck
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!