1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
10

What type of virus was the "lloveyou" virus? 1.Trojan 2.Worm

Computers and Technology
2 answers:
Paul [167]3 years ago
8 0

Answer:

2. Worm

Explanation:

ki77a [65]3 years ago
7 0

Answer:

1

Explanation:

You might be interested in
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
3. SmartArt can be used to create that highlight relationships between two items.
KengaRu [80]
<span>SmartArt can be used to create graphic organizers (Solution:B) that highlight relationships between two items. With SmartArt you can make visual representation of your ideas and information. The tool SmartArt is available </span>in Excel, PowerPoint, Word, but also you create SmartArt object in Outlook.
There are different layouts available for this type of representation.
8 0
3 years ago
The default case is required in the switch selection statement.
babunello [35]

Answer: False

Explanation:

 The given statement is false, as it is not compulsory that the default case is require in switch selection statement. If the default case are not properly specified in the statement then, there will be no execution occur in the switch selection statement.

It is sometimes good to have default case in switch selection statement, but it is not mandatory. The default case only executed when the correct case is present and none of the case matches in the given statement.

5 0
3 years ago
Which of these items will least likely increase pressure in the evaporative emission control system?
ella [17]

Answer:

a

Explanation:

a

7 0
3 years ago
ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY
suter [353]

Answer:

B.

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • What is data protection
    13·1 answer
  • Wich is the last step in conducting a URL search
    14·2 answers
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • 1. What is JavaScript?
    15·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • Why might a business choose a server-based network over a peer-to-peer network?
    15·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • Any one know??please let me know
    15·2 answers
  • Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
    10·1 answer
  • Is it a way to get robuc 4 free
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!