1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
10

Viruses which activate themselves after a specific time is called

Computers and Technology
2 answers:
DanielleElmas [232]3 years ago
8 0

Answer:

c. bombs ans

Explanation:

this is may be helpful!

viruses which activate themselves after a specific time are called as bombs.

hjlf3 years ago
5 0

Answer:

b

Explanation:

You might be interested in
What are files that are placed on a computer by some websites when the user visits the site?
Otrada [13]

Answer:

A: Cookies.

Explanation:

Usually you will get a message about the site using "cookies" to help user experience.

3 0
3 years ago
You can send emails to individuals from your address book.<br><br> True<br> False
MAXImum [283]
I believe the answer is False or I may be wrong
5 0
3 years ago
What purpose would tracking changes be most useful for?
olya-2409 [2.1K]
So, you can be able to make a prediction and understand the cycle.
6 0
3 years ago
Are there different types of machine language?
7nadin3 [17]
No machine language have no any type
7 0
3 years ago
Read 2 more answers
Select the correct text in the passage.
Maurinko [17]

Answer:

some parents have replaced the customary practice of reading a bedtime story to childern with a television show of the child's choice

Explanation:

7 0
3 years ago
Other questions:
  • The default view in word is ____ view, which shows the document on a mock sheet of paper in the document window.
    6·1 answer
  • In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simult
    9·1 answer
  • When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
    11·2 answers
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
    6·1 answer
  • Please Help! <br> I need good Anime to watch!
    7·1 answer
  • What does good time management mean​
    8·2 answers
  • Some applications required advanced storage solutions are available to provide fault tolerance and high performance.
    13·1 answer
  • What is the output of the following JavaScript code?
    9·1 answer
  • Please help with this question
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!