1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
10

What is Least effective at preventing a computer virus

Computers and Technology
1 answer:
Nina [5.8K]3 years ago
5 0
Anti-virus software that just scans your computer is the least effective.
 
You might be interested in
20 points!!!!! Help, I am being timed!!!!!!!
jarptica [38.1K]

Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.

Explanation:

3 0
2 years ago
Where should citations be included in your research paper? Select all that apply.
yKpoI14uk [10]

Answer:

it would be the first one because it's the header and that's what applies

5 0
3 years ago
Consider the efficiency of locating the kth element in a singly-linked list. How does that compare to locating the kth element i
eimsori [14]

Answer:

Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list

Explanation:

Assuming that  both lists have firs_t and last_ pointers.

For a singly-linked list ; when locating a kth element, you have iterate through a number of k-1 elements which means that locating an element will be done only in one ( 1 ) direction

For a Doubly-linked list : To locate the Kth element can be done from two ( directions ) i.e. if the Kth element can found either by traversing the number of elements before it or after it . This makes finding the Kth element faster because the shortest route can be taken.

<em>Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list </em>

4 0
2 years ago
What does a proxy server do?
Otrada [13]

I believe your answer would be C, but that also falls under a VPN.


8 0
3 years ago
Read 2 more answers
What are the means of hardware security?​
sdas [7]

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

5 0
2 years ago
Read 2 more answers
Other questions:
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • Which of the following has allowed computers to have more memory capabilities without making them extremely expensive Virtual me
    9·1 answer
  • __________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
    13·1 answer
  • Assuming a computer has a single processor and a single core with no support for parallel execution, explain why running a multi
    11·1 answer
  • As it turns out, the scale of this chart is higher than all of these; it’s “exponential.” What does this imply for the difficult
    8·1 answer
  • What is the difference between edge and core networks?
    13·1 answer
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • If tech is smarter than us. How did a human make something smarter than him/her?
    9·2 answers
  • Write a c++ program to print even numbers from 1 to 20​
    15·1 answer
  • What is a database and provide 2 examples of how you are using a database.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!