1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
8

What effect do you think this will have on the program when you run it?

Computers and Technology
1 answer:
Mandarinka [93]3 years ago
8 0
It depends on what program you are running.
You might be interested in
Write a brief description of what the local authorities are recommending in the news people should do to protect themselves from
lana [24]
The brief description of the local author asbestos is Hope and that's what it would too with a heart and another heart which equals 100 which equals yes
3 0
3 years ago
Which tab of the ribbon includes the links group for creating hyperlinks or internal references?
Deffense [45]
The correct answer is D.File
5 0
4 years ago
Read 2 more answers
Answer quick plzzz I only have 2 hours
Nana76 [90]

Answer:

option 2

Explanation:

8 0
3 years ago
Read 2 more answers
What is a possible effect of malicious code cyber awareness 2022.
ANEK [815]

The possible effect of malicious code cyber awareness 2022 is that It can

  • damage or compromise digital files.
  • Erase  hard drive and give room for hackers access to  PC.

<h3>What are  malicious code?</h3>

They are codes that are dangerous to operation of our computer system and includes;

  • viruses, trojan
  • horses, worms
  • macros

Learn more about effect of malicious code at:

brainly.com/question/17209742

5 0
3 years ago
Three basic components to cloud computing are client, internet
MrRissso [65]

Answer:

the basic components of cloud comuting in a simple topology

3 0
3 years ago
Other questions:
  • Identify at least three body language messages that project a positive attitude?
    15·1 answer
  • A type of memory that is expensive and therefore is often used only in cache memory applications.
    15·2 answers
  • Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
    9·1 answer
  • 3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
    15·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • So can u please follow my new ig acc i just started it yesterday its called stunnerspamz
    5·2 answers
  • We are building a word processor and we would like to implement a "reflow" functionality that full-justifies text.Given a maximu
    12·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • Can someone help me with this
    10·1 answer
  • Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!