1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
15

Help with this please anyone

Computers and Technology
2 answers:
kondaur [170]3 years ago
6 0

Answer:

1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.

2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.

3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.

4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.

Explanation:

Pls give another person brainliest...

thanks hope it helps

Vsevolod [243]3 years ago
3 0

Answer:

       trojan horse

         worm

         virus

        spyware

Explanation:

gimme the brainliest hehe

You might be interested in
It is ok to sell services on Xbox in exchange for real-world money
Sati [7]
Is this a true or false question? If it is let me know and I can help! (:
6 0
4 years ago
Read 2 more answers
Which of the following is a new feature in Windows Server 2016 that enables block-level data replication to occur automatically
Inessa [10]

Answer:

Option C is the correct answer for the above question

Explanation:

  • The storage replica is a new advantage that is used in the 2016 version of the windows server. It is a feature which is very useful for the user point of view, because of it more secure the data transfer on the internet.
  • It is used to block the duplicate data, by which the storage space is left for the other data and the data will secure when it stores on the server.
  • The above question asked about the features which are a new advantage of the 2016 version and provide block facilities for the duplicate data which is storage Replica which is defined above.
  • Hence the correct option is C, while the other is not because others is not a feature to block the duplicate data.
7 0
3 years ago
A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
QveST [7]

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

8 0
3 years ago
Your motherboard supports dual channeling and you currently have two slots populated with DIMMs; each module holds 2 GB. You wan
Olenka [21]
One 4-GB DIMM. Dont really have a explanation for it just comes from previous experience
6 0
4 years ago
Read 2 more answers
11. Written and artistic expressions are protected by
Lina20 [59]

Answer:

B

Explanation:

Written and artistic expressions are protected by intellectual property law.

8 0
2 years ago
Other questions:
  • Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
    9·1 answer
  • Write a class that can make comparisons between the efficiency of the common methods from the List interface in the ArrayList an
    5·1 answer
  • Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
    10·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manne
    12·1 answer
  • The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
    14·2 answers
  • (Please Help)
    13·1 answer
  • String member function compare compares two strings (or substrings) and returns 0 if:
    5·1 answer
  • Carmen has met new people online that she enjoys talking to. One of these people has asked her to meet at the park in person and
    15·1 answer
  • Complete each of the following sentences by
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!