1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
12

Computer viruses often spread by means of what?

Computers and Technology
2 answers:
lozanna [386]3 years ago
8 0
Email attachments hope this helps
Alex17521 [72]3 years ago
5 0

Answer:

Email attachments just took the test

Explanation:

Its easy to travel off those because they are free of security and protection ur welcome.

You might be interested in
Which type of sentence error, if any, is the above example? 
sammy [17]
I'm gonna say D. No sentence error
3 0
4 years ago
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
. Which of the following is NOT an option for increasinghard drive storage space?
Andrew [12]

Answer: B) Install an addition memory card to the current drive

Explanation: Drive  storage space is space that has particular capacity to store files and data. If the storage reaches the capacity,it turns out that more space is required for the data storage. The hard drive is a major storage space in a system with large capacity. So, if it gets full, there are various ways it could be increased such as replacing it with other internal hard drive, external hard drive etc.

But installation of the memory card is not the solution for increasing the space because they don't have very large space and can only support small devices.

7 0
3 years ago
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
jeka94

Answer:

A. true

Explanation:

Based on the information provided within the question it can be said that the statement is completely true. This is because, traffic-monitoring applications have the main function of monitoring and analyzing the flow of traffic of one or various different items. Which can be applied to the business involving utility, infrastructure, and environmental services by monitoring the specific items regarding each business. Therefore making sure that enough product is entering or leaving each business as it is suppose to. As well as providing stock analysis and defective product alerts.

6 0
4 years ago
What is the best way to protect against the loss of important files
Lemur [1.5K]
Back them up on a different drive
4 0
3 years ago
Other questions:
  • Write a program that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, i
    11·1 answer
  • To create a default value for a parameter in the parameter list of a function, you code a/an ________________ sign after the par
    5·1 answer
  • Consider the following page reference string:
    12·1 answer
  • If an appliance consumes 500 W of power and is left on for 5 hours, how much energy is used over this time period?
    5·1 answer
  • Michelle is a salesperson who is paid on commission. She just sold a customer a very reasonably priced tablet, but only after th
    14·1 answer
  • Which of these is not considered by economists to be a want?
    8·1 answer
  • With a DUI charge on a driver’s record A. the price of his/her insurance greatly increases. B. he/she may drive only during day
    5·2 answers
  • 8.10 LAB: Convert to binary - functions Write a program that takes in a positive integer as input, and outputs a string of 1's a
    12·1 answer
  • A custom information feel that helps users find a specific document is called
    7·1 answer
  • ________ include programs such as word processing, spreadsheet, database,presentation graphics. Personal information,
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!