1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
10

What type of virus was the "lloveyou" virus? 1.Trojan 2.Worm

Computers and Technology
2 answers:
Paul [167]3 years ago
8 0

Answer:

2. Worm

Explanation:

ki77a [65]3 years ago
7 0

Answer:

1

Explanation:

You might be interested in
# .<br>1) ?<br>2) ?<br>3) ?<br># .<br>1)=<br>2)=<br>3)=<br>4)=<br> * *​
svetoff [14.1K]

Answer:

1234566788i5ttr4467

8 0
3 years ago
Your objective is to create a set of files to be used as ‘flags’ that will be stored on computers used in a ‘capture the flag’ c
Semenov [28]

The following are the steps involved in the Process validation to the industry standard,

1)     Design of the process

2)     Qualification of the process

3)     Verification of the process

Explanation:

Validation is the process of finding whether the process meets its expected outcome.

1)     Construct knowledge about the process to be performed and establish a final design.

2)     Evaluation of the designed process is being done at this stage to rectify the errors and changes can be done.

Test the process to check whether the expected goal of the process being designed is achieved or not.

5 0
4 years ago
Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
sashaice [31]

Answer:

-------------------------######################

4 0
3 years ago
Read 2 more answers
Which NIMS communication principle ensures that communications and information systems can be expanded to support any situation,
madam [21]

Answer: Portability

Explanation: National; approach to incident management(NIMS) principle named as portability is responsible for the supporting the system in any situation. It lets an individual to access the equipment that are familiar.

Portability helps in moving the flow of the communication and resources with easiness and information system can be extended till the requirement to support the incidental situation.

8 0
4 years ago
How to get past a school firewall first one to tell me get brainliest and i want a legit answer
Scorpion4ik [409]
Depends on what you are using. Safari, Google Chrome, or Firefox.
6 0
3 years ago
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o
    12·2 answers
  • A database is helpful when you have large amounts of information that you wish to
    5·1 answer
  • John is considering his STEM education choices. He wants to begin working in the technology field as soon as possible.
    12·1 answer
  • _____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless
    15·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • Write a Python Program that:
    9·1 answer
  • What is the most used piece of technology in education?
    13·1 answer
  • The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an opera
    9·1 answer
  • Why are visually interesting effects, such as WordArt, to be used sparingly?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!