1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
2 years ago
11

What is the effective address generated by the following instructions? Every instruction is

Computers and Technology
1 answer:
kaheart [24]2 years ago
5 0
D. Mov ax, [bx+si] is your answer
You might be interested in
Whats important about the points?
likoan [24]
You can earn ranks! That is important.
8 0
3 years ago
Read 2 more answers
I NEED HEP QUICK
avanturin [10]

Answer:

O = (C2+C3+C4+C5)-81

Explanation:

5 0
2 years ago
Is it possible to do calculations with text data in Ms Excel
ss7ja [257]
The answer for this question is YES
3 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
Other questions:
  • What is the penalty for refusing to submit to alcohol testing (drivers ed)
    7·2 answers
  • Why should you stay out of the open space to the right of a semi tractor trailer?
    7·2 answers
  • All of the following are aspects of the search process except?
    6·2 answers
  • Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
    6·1 answer
  • While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
    11·1 answer
  • Drag each tile to the correct box.
    15·1 answer
  • PLEASE ANSWER THIS ASAP‼️
    10·2 answers
  • Predict the output
    7·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!