1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
9

PLS HEEELLLP ASAP, DONT JOKE

Computers and Technology
2 answers:
Deffense [45]3 years ago
7 0

Explanation:

Computer viruses are spread through transportable secondary storage.e.g, inserting a hard disk that already has virus into another computer.

Lady_Fox [76]3 years ago
6 0
The answer is C secondary storage
You might be interested in
Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
daser333 [38]

Answer:

Time taken to travel from one track to the next = 0.08ms

Initial track= 15     0

4      (15-4)*(0.08)= 0.88

40     (40-4)*(0.08)= 2.88

35      (40-35)*(0.08)= 0.4

11       (35-11)*(0.08)= 1.92

14       (14-11)*(0.08)= 0.24

7         (14-7)*(0.08)= 0.56

----------------------------------------------

Total seek time=0.88+2.88+0.4+1.92+0.24+0.56=6.88ms

Explanation:

We caculate the seek time for each request, and then add them together to find the total seek time. The final track number for the current request becomes the current track of next request, and this process is repeated till the last request is processed.

4 0
3 years ago
Assume that a program uses the named constant PI to represent the value 3.14. The program uses the named constant in several sta
mihalych1998 [28]

Answer:

The advantage for the above condition is as follows:-

Explanation:

  • If a user creates a defined constant variable and assigns a value on its and then uses that variable instead of the value, then it will a great advantage.
  • It is because when there is a needs to change the value of that variable, then it can be done when the user changes the value in one place. There is no needs to change the vale in multiple places.
  • But if there is a value in multiple places instead of a variable and there is no constant variable, then the user needs to change the value in multiple places.
7 0
3 years ago
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
The development of computer languages is classified into two categories .<br><br>true or false​
Vikki [24]

Answer:

False

Explanation:

Mark me as a brainliest

6 0
3 years ago
PLEASE HELP!!! THIS IS DUE TODAY!! WILL MARK BRAINLIEST!!
noname [10]

Answer:

1. Respecting rules and cookies while browsing a website.

2. Being kind and properly following the requirements the owner asks you to follow. Reporting any sort of comment or image that is hurtful/harmful.

Explanation:

1. By the rules and cookies for a website, you ensure the safety of your device  and are not putting any information at risk.

2.  Cyberbullying is a huge issue and you can reduce cyberbullying with the simple steps of being kind and respecting others.

Conclusion:

These rules are examples of good digital citizenship and following them will benefit you and your peers greatly.  

8 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Explain the difference between the legal protections a security officer enjoys and the legal protections a police officer receiv
    12·2 answers
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • How does the Rights Management Services feature help to protect information
    11·1 answer
  • If you wanted to look up an article from the Chicago Tribune the best place to start would be
    7·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to pr
    13·2 answers
  • CAN SOMEONE PLEASE PLEASE HELP ME OUT !!!!
    12·1 answer
  • Differenciate between foreign key and primary key in database.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!