1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
6

A source mainly provides from a text or piece of media.

Computers and Technology
2 answers:
Vlad [161]3 years ago
8 0

Answer:

Information is correct !!!!!!!!!!!!!!!!!!!!!!!!!!!!!1

Explanation:

May I have brainiest but its okay if not

Novay_Z [31]3 years ago
3 0

Answer:

✔ information

A source mainly provides <u>information</u> from a text or piece of media.

Explanation:

because of edge

You might be interested in
Why doesnt brainly let me skip by watching video?
oksian1 [2.3K]

What do you want to skip in brainly? There isn't anything to skip that I can think of.

4 0
3 years ago
Distinguish between the desktop publishing packages and multimedia packages​
maksim [4K]

Answer:

___________________________________________________________

Word processing software is used for working with text, while desktop publishing software involves production of documents that combine text with graphics. DTP software is perfect for making flyers, brochures, booklets. This type of software is usually more advanced than word processing apps.

___________________________________________________________

4 0
2 years ago
Is October tornado season?
Reptile [31]
No October is not tornado season
5 0
3 years ago
Read 2 more answers
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
Write a program that fills a list with 100 random numbers between 0 and 200, inclusive. Traverse through the list and only print
svet-max [94.6K]

Answer:

Follows are the code to this question:

import random as ra#import package  

r=[ra.randint(0, 200) for x in range(100)]#defining a variable r that use rand method to add value in list  

j= [i for i in r if i < 99]#defining j variable that checks list value is less than 99

print (j)#print list value

Output:

[20, 23, 66, 47, 89, 7, 18, 13, 92, 31, 23, 60, 3, 52, 18, 20, 85, 64, 55, 98, 14, 80, 80, 14, 57, 92, 76, 14, 91, 83, 87, 80, 16, 50, 7, 88, 19, 4, 72, 23, 27, 79, 23]

Explanation:

In this code, package random is imported, in the next step, the r variable is declared, that uses the randit method, and use for loop that adds value in the list. In the next step, the j variable is declared, which uses a for loop and a conditional statement to check its value is less than 99, add print its value.

7 0
2 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
    8·1 answer
  • Write a MIPS assembly language program that accomplishes the following tasks:The program will prompt the user to enter an intege
    7·1 answer
  • Create a horizontal line across middle of the entire form. To code this the ____ values are the same.
    7·2 answers
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • A domain name is used to: *
    15·1 answer
  • What are the characteristics of computer. Explain any one​
    15·2 answers
  • People’s personal information is collected _____. Select 4 options.
    7·2 answers
  • Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides i
    6·1 answer
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!