1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
11

Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con

algún paquete de seguridad.
Computers and Technology
1 answer:
Zina [86]3 years ago
5 0

Answer:

The answer is: antispyware.

Explanation:

Let me translate your question first:

Software that searches for, detects, and removes spyware-type malware; it can be installed on the computer in isolation or in conjunction with a security package.

And the answer to your question is anti-spyware. An anti-spyware is a program that protects your computer from any type of spyware malware which tries to get private information from you and disturb your privacy. There are many different anti-spyware programs, some of which include Windows Defender, Spybot - Search and Destroy, and many others.

You might be interested in
Which of the following is applicable during a hostile act:
Elanso [62]
Your question has been up too long, a moderator may have to delete it.
we will contact moderators to find your question and remove it, and hopefully, they will refund the points, which is not up to me.
<span>thank you for using brainly.</span>
3 0
3 years ago
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
What happens in Word 2016 when the Home ribbon tab is clicked on?
serg [7]

Answer:

The answar is D.

Explanation:

7 0
3 years ago
For the best night photographs, you’ll need to have a camera with a shutter speed of about 3 to 30 seconds
Alex_Xolod [135]
What are you trying to ask?

8 0
3 years ago
Write a function that receives two numbers, m and n and calculates and displays the sum of the integers from m to n. For example
Evgesh-ka [11]

Answer:

The program to this question as follows:

Program:

//header file

#include <stdio.h> //defining header file

void inc(int m,int n) //defining method inc

{

   int sum, i; //declaring variable

   sum=m; //holding value of m variable

   for(i=++m;i<=n;i++) //loop for calculate number between given range  

   {

   sum=sum+i; //adding value

   }

   printf("sum of the integer is : %d",sum);//print value

}

int main() //defining method

{

   int m,n; //defining integer variable

   printf("Enter m value: "); //message

   scanf("%d",&m); //input value by user in variable

   printf("Enter n value: "); //message

   scanf("%d",&n);//input value by user in variable

   inc(m,n); //calling method

   return 0;

}

Output:

Enter m value: 3

Enter n value: 7

sum of the integer is :25

Explanation:

In the above code, an "inc" function is declared, that accepts integer parameters that are "m and n", inside the method two integer variable "sum and i" is declared, which is used in the loop.

  • The loop uses the user parameter to count value and uses the sum variable to calculate there sum.
  • In the main method, two integer variable n and m are declared, which take value from the user end, and at the last, we call the inc method, that prints sum value.
7 0
3 years ago
Other questions:
  • The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
    10·2 answers
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • Which of these is a major mobile game developer?
    15·2 answers
  • Source view shows your website_____ A) exactly as it would appear when published B) approximately as it would appear when publis
    8·2 answers
  • A _____ is the useful part of a transmission through a network.
    15·1 answer
  • You’re creating a table for one of your slides, and need to make some modifications to your table structure. Which of the follow
    6·2 answers
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • How to convert a .enw file into a .pdf without downloading any applications? (If I have to, then I will. Just please tell me.)
    14·2 answers
  • How is knowing how to use word or docs importamt?
    8·1 answer
  • Which kind of typography focuses on the details of a character?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!