1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
11

A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​

Computers and Technology
2 answers:
mars1129 [50]3 years ago
8 0

Answer:

a person who creates a computer virus is a programmer

Alborosie3 years ago
6 0

Answer: hacker

Explanation:

You might be interested in
Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code
PIT_PIT [208]

Answer:

from the document and show the code it used to do it. Need it ASAP before this monday. Tables.sql file need to do this is in the document file. Extra points and brainliest for one who have most correct

5 0
3 years ago
HELP ASAP
Tju [1.3M]

Answer: B. Personal Idea

Explanation:

Issac Newton's Law of Gravity was made by the one and only, Issac Newton.

He used his time to investigate and discover this law, so choice one, cheating is not correct. Choice three is also incorrect, because the world didn't know about this law, or so much about gravity during that time.

Thus, choice two is correct because it was created and written through his ideas.

So therefore, the answer is choice two, personal idea.

Read more on Brainly.com - brainly.com/question/10659333#readmore

4 0
3 years ago
Web and mobile applications are created for users to only read information. True False
SIZIF [17.4K]
I think it's false. It's not created just for reading.
4 0
3 years ago
Read 2 more answers
A pseudo code that asks the user for their forename and their surname , and then outputs both, separated by a space to the user​
Mamont248 [21]

Answer:

Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

5 0
2 years ago
Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
GarryVolchara [31]

Answer:

d. Data Loss Prevention (DLP)

Explanation:

Data Loss Prevention (DLP) -

It refers to the type of strategy , where any sensitive or personal information can not be leaked out in the corporate network , is referred to as data loss prevention .

There are various software products that help to save the data , by controlling the information shared by the users .

The method is important for any business .

Hence , from the given scenario of the question ,

The correct answer is d. Data Loss Prevention (DLP) .

7 0
3 years ago
Other questions:
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    6·2 answers
  • As you are researching RAM for a computer you are building that will be used as a home office server for his small business. The
    5·2 answers
  • ​according to your text, digital natives tend to prefer different digital communication channels more than do digital immigrants
    5·1 answer
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • ¿Es especial que mi cumpleaños sea el día de San Valentín?<br><br> si o no
    11·2 answers
  • You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ...,
    13·1 answer
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • Jeremy has created a document that has images and a chart. The chart has to be updated manually, and double-clicking on the char
    15·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!