1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
12

Why do we use antivirus program?please tell fast​

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
6 0

Answer:

Antivirus – Starting with the obvious, an antivirus program will protect against computer viruses, or attacks that mean to damage a computer. ... Antivirus software can prevent this sort of attack - stop computer worms.

You might be interested in
Select the correct answer
Kamila [148]

Answer:

a point at which the user chooses a certain path.

6 0
3 years ago
Read 2 more answers
How can you tell that a website is valid and reliable?
larisa86 [58]
If there is an about page where it tells whom made the website, as well as a copyright 2016 on the bottom of the page. This basically means the website is useful and updated by the creators. Another factor which the site doesnt always need but if it has an https at the beginning of the url then it should be good and valid because that means the site is secured. Also factor in the sections where articles are present, if they have a date and an author towards the bottom or top of the article, then it can be trusted as well. Theres a lot more you can look for in a site and validating if it is an okay site but these are a few examples. Hope this helped!:)
3 0
3 years ago
Determine the number of bytes necessary to store an uncompressed RGB color image of size 640 × 480 pixels using 8, 10, 12 and 14
dexar [7]

Answer:

For 8 bits / Color Channel: 921, 600 bytes.

For 10 bits / Color Channel: 1,152,000 bytes.

For 12 bits / Color Channel: 1,382,400 bytes.

For 14 bits / Color Channel : 1,612, 800 bytes.

Explanation:

Un uncompressed RGB color image of 640 pixels wide by 480 pixels height (VGA resolution) uses 3 samples of x bits fin order to represent the quantity of each primary color (red, green and blue) in a given pixel of the image.

So, if we use 8 bits/ sample, we can calculate the bytes needed to store a complete image as follows:

640*480*3*8 bits = 7, 372,800 bits. (1)

As, by definition, 1 byte= 8 bits, we have:

Nº of bytes = 7,372,800 / 8 = 921,600 bytes. (2)

In order to get the bytes needed to store the same image, using 10, 12 and 14 bits/ sample, all we need is replacing 8 by 10, 12 and 14 in (1), and then dividing by 8 as in (2).

Proceeding in this way we obtain:

640*480*3*10 = 9,216,000 bits ⇒    1,152,000 bytes.

640*480*3*12 = 11,059,200 bits ⇒   1,382,400 bytes.

640*480*3*14=   12,902,400 bits ⇒  1,612,800 bytes.

8 0
4 years ago
The most fundamental components of storage that users interact with are the:
Levart [38]
<span>A file can contain the instructions of a computer program or the data that you care to store.

so the answer is =  file
</span>
8 0
4 years ago
What is the main function of an operating system​
alina1380 [7]

Here are the main functions of an operating system:

1) Manage the resources of the device

The operating system controls how much of each resource is distributed, and it controls things like the processing unit and memory.

2) Establish a interface for the user of the device

The operating system must classify what the classes of the script/code have to do and what they implement.

3) Service application software

The operating system must service each application that is downloaded onto the device. It must balance it's use of storage between apps.

4 0
3 years ago
Other questions:
  • Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
    11·1 answer
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • Please help ASAP, will mark brainliest!
    14·1 answer
  • What type of engineering drawing use symbols to represent components drawings
    6·1 answer
  • True/False/Unknown. For the interpretation of function calls, we assign the formal parametersto the valuations of the actual arg
    11·1 answer
  • Drag each label to the correct location on the image.
    7·1 answer
  • What is a Forloop and what is it used for?
    7·2 answers
  • Many companies ban or restrict the use of flash drives
    11·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!