1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
2 years ago
9

The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​

Computers and Technology
1 answer:
Svetllana [295]2 years ago
4 0

Answer: b

The computer virus is simply a ___

b. Set of computer instructions or code

You might be interested in
Super easy question but you have to think about it because it’s not that easy I’ll mark brainliest for first answer Explain the
kkurt [141]

Answer:

Databases are not that simple. Now we not only have a Data warehouse, but we also have the Data Lake as well. We also have NoSQL and SQL form of support with these modern databases. The JSON format is rocking. You can hence through JSON store the text, image, audio, video, etc in one go. And like the first five can be a text, the next five can be an image then again a text than video, and so on. And it is super easy to access them as well. Also, you can edit them quite easily as well. It's not that hard like the Lisp used to be in the past. And supermarket has a mix blend of the database. And modern databases like Data Lake can be very useful, undoubtedly.

You can store security type of requirements, like CCTV footage, each shop details like shop ID, Product list, shop type, electricity bill, hours of opening, floor, facilities, no. of employees, etc., and like this, we can have the details for the entire supermarket, and each shop there definitely. And we can perform various actions on behalf of each shop and market as well. The database can hence be very useful definitely

Explanation:

Please check the answer.

8 0
3 years ago
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
2 years ago
What benefit does internet have​
Licemer1 [7]
Information can be transferred and passed way easier.
5 0
3 years ago
If your computer is frozen what is something you would do to troubleshoot the problem ​
SpyIntel [72]

Answer:

Ctrl+Alt+Del

Explanation:

It will take you to the task manager and you can highlight the program that is frozen, right click on it and select end task. Or hard reboot as a last resort.

4 0
1 year ago
Assume you have a button control named btndisplaylist. Which is the default name for an event procedure that will be executed wh
dybincka [34]

The default name for an event procedure that will be executed when the user clicks on the control will be btnDisplayListclick.

<h3>What is a default name?</h3>

It should be noted that a default name means a name that's assigned to a folder that's created in a computer.

In this case, the default name for an event procedure that will be executed when the user clicks on the control will be btnDisplayListclick.

Learn more about default on:

brainly.com/question/23976472

#SPJ12

8 0
1 year ago
Other questions:
  • A program to add two numbers in C++
    15·1 answer
  • A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
    10·1 answer
  • Is badlion safe and how ?
    14·1 answer
  • Arrange the binary number in increasing order of their arithmetic output in the decimal number system ?
    9·1 answer
  • What is first page of website called​
    10·1 answer
  • This is your data.
    11·2 answers
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • Which of the following is an example of two-factor authentication?
    10·2 answers
  • question 1 scenario 1, question 1-5 you’ve just started a new job as a data analyst. you’re working for a midsized pharmacy chai
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!