1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
9

PLS HEEELLLP ASAP, DONT JOKE

Computers and Technology
2 answers:
Deffense [45]3 years ago
7 0

Explanation:

Computer viruses are spread through transportable secondary storage.e.g, inserting a hard disk that already has virus into another computer.

Lady_Fox [76]3 years ago
6 0
The answer is C secondary storage
You might be interested in
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
SOVA2 [1]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
5 0
3 years ago
Read 2 more answers
Please help! Why might NASCAR engineers modify racecars to create the type of drag your racecar experienced?
lutik1710 [3]
They modify is bcuz every race car is different and the driver is going to want something different then everyone else. 
4 0
3 years ago
Which protocol below is used to email clients to send email
AVprozaik [17]

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails

4 0
3 years ago
after clicking the start button on your computer screen desktop what option would you then select to examine systems components
xenn [34]
You would click on control panel to get to that area
7 0
3 years ago
Has anyone done the unit 10 lesson 9 encryption/decryption texts on code.org?
Pani-rosa [81]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

5 0
3 years ago
Other questions:
  • Here is a Test Code segment:
    13·1 answer
  • How to eject a flash drive from chromebook?
    6·1 answer
  • A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
    11·1 answer
  • Which of the following describes the operating system
    5·1 answer
  • Ted wants to follow the StartSafe philosophy when working around electricity. Which of the following steps would be consistent w
    15·2 answers
  • ppose we have a Rectangle class that includes length and width attributes, of type int, both set by the constructor. Define an e
    9·1 answer
  • Does anyone know how to fix this???
    11·1 answer
  • What would happen without satellites???
    12·2 answers
  • Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a v
    14·1 answer
  • How do you change your name on your brainly profile
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!