1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
8

Social networking is the most popular online activity? True False

Computers and Technology
2 answers:
Fiesta28 [93]3 years ago
8 0

Answer:

true

Explanation:

loris [4]3 years ago
3 0
It’s true because I said so
You might be interested in
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Which is not covered under the Computer Access Device and Computer Fraud and Abuse Act (CADCFA)? unauthorized use of federal com
Mazyrski [523]

Answer:

The correct answer to the following question is "Typewriters".

Explanation:

CADCFA seems to be the very first provision of federal laws to specifically concentrate on computer assault. These clauses continued to allow corporations to prosecute unjust workers for compensation for the misuse of confidential or sensitive information.

  • Even though we all agree that sometimes a federal worker uses the typewriters in the abundance of power, that's why it's not protected by that same act.
  • The other options are incorrect because they are all known and are covered for that given CADCFA act.
5 0
3 years ago
How Charles Babbage Concept of<br>Computer has help the modern<br>Computer​
OLga [1]

English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

6 0
3 years ago
15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
kramer

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

7 0
3 years ago
Read 2 more answers
NO SPAMMERS, ONLY FULL ANSWER
melisa1 [442]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • When you right-click a word with a red squiggly line under it, which of the following displays?
    12·2 answers
  • Programmers compile a list of instructions to build their applications. These instructions are typically grouped into units of c
    10·1 answer
  • Describe conductors and insulators in terms of energy
    11·1 answer
  • If you ship bakudeku. I swear. <br> *RANTS*
    11·1 answer
  • Ken is a mobile app developer. He is designing a mobile app that offers tips and guidance to people interested in learning jazz
    8·2 answers
  • What does HTML stand for?
    6·2 answers
  • How is net pay different from gross pay?
    11·1 answer
  • Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t
    11·1 answer
  • How does defragmentation improve performance?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!