1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
6

How does Virus transfer from one computer toanother computer?​

Computers and Technology
1 answer:
Daniel [21]3 years ago
5 0

Answer:

Viruses can enter your computer in any number of ways, such as via an email attachment, during file downloads from the Internet or even upon a visit to a contaminated Web site.Jun 2, 2010

Explanation:

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

You might be interested in
6. Larger Than n In a program, write a function that accepts two arguments: a list, and a number n. Assume that the list contain
Reika [66]

Answer:

The solution code is written in Python

  1. def largerThanN(myList, n):
  2.    output = ""
  3.    for x in myList:
  4.        if(x > n):
  5.            output += str(x) + " "
  6.    
  7.    print(output)
  8. l = [5, 12, 11, 4, 56, 32]
  9. n = 15
  10. largerThanN(l, n)

Explanation:

Firstly, create a function largerThanN that accepts two arguments, a list (myList) and a number (n) (Line 1).

Next, create a output variable to hold the string of numbers in the list that are greater than the input number n (Line 2).

Create a for loop to traverse through each number in the list and then check if the current x is bigger than n. If so concatenate the x to output string along with a single space " " (Line 4 -6)

After the loop, print the output string (Line 8)

We test the function by using a sample list and n = 15 (Line 10 - 12). The program will display 56 32 .

6 0
3 years ago
Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T
iren [92.7K]

Answer:

Explanation:

( n cards are there initially )

we pick out the first card in random it takes n-1 comparisons to figure out

its Equivalence card - n-1 steps

Two cards have been eliminated ( this leaves us with 2 and n-2 cards)

we pick out the 2nd card in random it takes n-3 comparisons to figure out

its Equivalence card - n-3 steps

we continue to do this.. till all cards are exhausted ( leaves us with 2

and n-4 cards again)

the last comparison will

have

- n-(n-3)

the sum of all these steps - (n-1) + (n-3) + (n-5) + .........+

(n-(n-3))

if you draw this in the form of a tree.

n - n

2

n-2 - n

2

n-4 - n-2

2

n-6 - n-4

2

n-8 - n- 6

the height of the tree will be log n , sum @ each level is at most n

8 0
3 years ago
____ arguments may provide more control over the returned value.
OLga [1]
D. Absolute is the answer
3 0
4 years ago
In an advanced word processing program which type of image or graphic is available in a variety of formats and styles?
ira [324]
IS it coding?If not sorry
5 0
3 years ago
Read 2 more answers
Which of the following is NOT a good way to reduce pollutants in paint shops?
Citrus2011 [14]

Automobile repair shops produce many types of waste -- some hazardous, some not necessarily hazardous but still potentially damaging to the environment if not handled properly, and all requiring proper treatment and/or disposal at significant cost to the business. A list of the types of waste that the shop owner or manager must contend with would include:

solvents (paints and paint thinners)

antifreeze

scrap metal

batteries and other auto parts

oils and oil filters

fuels of various types

acids and alkalis (contaminated rags and towels)

Whatever the nature and characteristics of the waste may be, it all has one thing in common: All waste represents loss of resources and loss of money.

4 0
3 years ago
Other questions:
  • The technological advancements allowing for
    10·1 answer
  • Ella has finished drafting her presentation. What should she do next?
    6·2 answers
  • This is not for school but how do I mark am answer brainliest?
    15·1 answer
  • What is the value of the variable named result after the following code executes? var X = 5; var Y = 3; var Z = 2; var result =
    14·1 answer
  • List the seven basic internal components found in a computer tower
    6·2 answers
  • To make a black and white image out of a color image, you would use which option?
    7·1 answer
  • What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr
    14·1 answer
  • How do I answer other peoples question. is there something to click because i dont see it.
    14·2 answers
  • What are types of operators in Python
    15·1 answer
  • As the complexity of a network increases, the possibility of security breaches decreases. is this true or false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!