1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
4 years ago
10

Compare computer virus and worm ​

Computers and Technology
2 answers:
Zina [86]4 years ago
7 0

Answer:

You can say they're somewhat alike, since a worm wiggles into a tight spot, just like how a computer virus wiggles into your computer-

Hope this helps-

rusak2 [61]4 years ago
5 0
Both could be eliminated. Computer virus damage the computer system. The warms help the soil.
You might be interested in
A small monster collector has captured ten Bagel-type small monsters. Each Bagel-type small monster has a 35% chance of being a
Doss [256]

Answer:

Check the explanation

Explanation:

Each Bagel-type small monster has 0.35 probability of being a Sesame Seed-subtype and 0.2 probability of being a Whole Wheat-subtype.

The probability that exactly 8 of them are Whole Wheat-subtype is \binom{10}{8}(0.2)^8(0.8)^2 using multiplication principle, because first need to choose which 8 are Whole Wheat-subtype, and if exactly 8 of them are Whole Wheat-subtype, then other two are not Whole Wheat-subtype. The former has probability 0.2, while the latter has probability 1-0.2 = 0.8 .

Kindly check the attached images below for the complete answer to the question above

6 0
3 years ago
What item on a business card is generally the most prominent?
andre [41]
All of them are correct


7 0
3 years ago
Read 2 more answers
At the aquarium Grandma Simpson hugged the dolphin is that passive or active sentence​?
geniusboy [140]

It is passive, because it says the grandma huggED the dolphin.

Active would be “Grandma Simpson hugs the dolphin at the aquarium.”

5 0
4 years ago
What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
katen-ka-za [31]
According to its structure I'd say that this is SEAL (<span>Software-Optimized Encryption Algorithm). It's difficult to describe how it works, because this kind of ciphers is very tricky. This algorithm uses 160 bit key and it uses 3 tables (R, S, T) to encode and decode.

I'll attach the image where you can see a process of creating a pseudo-random function:
</span>

7 0
3 years ago
When Building a resume what would i put when it says field of study especially when your still going to high school?​
Nastasia [14]
Just put Still attending or Enter Highschool then if they ask you about it just let them know your still attending, that’s what I did and got the job on the spot
6 0
3 years ago
Other questions:
  • Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them
    15·1 answer
  • What is micro blogging?
    13·1 answer
  • _________ is a specially formatted request used to perform ip address to data link address resolution.
    14·1 answer
  • Unlike images, tex and hyperlinks, vidoes _____ A) are playable in source view B are not used to affect user's emotions C) can b
    15·1 answer
  • Which of the following apply to the definition of Wide Area Networks? Check all of the boxes that apply.
    7·2 answers
  • An administrative assistant types a document, saves, and prints. The assistant is using _____.
    13·1 answer
  • In India, the adoption of new telecommunication services was ____________ Select one: a. slow b. rapid c. frought with errors d.
    15·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Find the quotient. 2.5 ÷ 5
    8·2 answers
  • When you started the vi editor, you forgot to specify the name for the new file you are creating. To save steps next time, how c
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!