1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
2 years ago
12

¿Qué diferencia existe entre un virus biológico y virus informático?

Computers and Technology
1 answer:
ddd [48]2 years ago
6 0

Answer:

i dont know spanish but i am gussing that you want to find differnce in virus information?

Explanation:

You might be interested in
Write the proghrams for the following:
belka [17]

Answer:

a)

#include <iostream>

using namespace std;

int main() {

   bool a,b,c;

   cin>>a>>b;

   if(a^b)//X-OR operator in C++.

   c=true;

   else

   c=false;

   cout<<c;

return 0;

}

b)

#include <iostream>

using namespace std;

int main() {

   bool a,b,c,d;

   cin>>a>>b>>c;

   if((a^b)^c)//X-OR operator in C++.

   d=true;

   else

   d=false;

   cout<<d;

return 0;

}

Explanation:

The above written programs are in C++.There is an operator (^) called X-OR operator in C++.It returns true if the number of 1's are odd and returns false if the number of 1's are even.

In the if statement I have user X-OR operator(^) to find the result and storing the result in another boolean variable in both the questions.

5 0
3 years ago
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
Which of the following is true of two-factor authentication?
dybincka [34]

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

7 0
3 years ago
The purchase and subsequent sale of a securities position in a customer account solely to generate commissions is____________.
Citrus2011 [14]

Answer:

Churning

Explanation:

Churning is termed as an act of a broker conducting immoderate trading in the account of client solely to generate commissions. It is an illegal and deceptive practice. It violates security laws. The purchase and subsequent sale of a securities that are little or insignificant to meet the investment goals of client can be the evidence of churning. Consequently it causes considerable losses in client's account or can produce a tax liability.

Churning occurs due to over trading by a broker to generate commissions by buying and selling stocks excessively on the behalf of investor. This often happens when broker has permissive authority over client's account.

5 0
3 years ago
Which of the following can be used to locate data in a particular column?
dangina [55]

Answer:

A. VLOOKUP

Explanation:

VLOOKUP is an Excel function to look up data in a table organized vertically. VLOOKUP supports approximate and exact matching, and wildcards (* ?) for partial matches. Lookup values must appear in the first column of the table passed into VLOOKUP.

Purpose 

Lookup a value in a table by matching on the first column

Return value 

The matched value from a table.

Syntax 

=VLOOKUP (value, table, col_index, [range_lookup])

Arguments 

value - The value to look for in the first column of a table.

table - The table from which to retrieve a value.

col_index - The column in the table from which to retrieve a value.

range_lookup - [optional] TRUE = approximate match (default). FALSE = exact match.

4 0
2 years ago
Other questions:
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Can your computer become infected with a virus via email
    10·1 answer
  • Please help will mark brainiest
    8·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • The stack pop operation
    10·1 answer
  • How to format the selected range of cells as u.s currency
    6·1 answer
  • Which are aspects of the post-production stage?
    9·1 answer
  • Cuando se creo argentina​
    11·1 answer
  • Which statement about routers is !!!FALSE!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!