1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Soloha48 [4]
3 years ago
14

Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often dama

ges resources on the systems where it is found?
Computers and Technology
1 answer:
Maksim231197 [3]3 years ago
7 0
Its know as a virus (a program created to spread and maliciously harm computers)
You might be interested in
What is the process of publishing a work in Photoshop?
Sunny_sXe [5.5K]

Photoshop is a software program developed by Adobe that allows users to edit graphics. It's used by graphic artists, designers and photographers, among others, and can enhance and manipulate images to improve their appearance. It's an excellent tool that makes photo editing easy and efficient.

Explanation:

  • In the past, it produced creative printing or home publishing programs used for desktop publishing too, but the primary page layout software from Corel is CorelDraw
  • Adobe InDesign is a desktop publishing and typesetting software application produced by Adobe Systems. It can be used to create works such as posters, flyers, brochures, magazines, newspapers, presentations, books and ebooks
  • Adobe InDesign is a standard piece of publishing software, and is commonly used by professional typesetters to design the inside pages of books.
  • Select an image, and then choose File > File Info
  • Use the File Info dialog box to view or edit an image's metadata. This dialog box displays quite a bit of information. Many of the settings in it are important in the metadata.
  • Metadata is a set of standardized information about a file, such as author name, resolution, color space, copyright, and keywords applied to it.
8 0
3 years ago
What are the keys in all rows that sit between the touch keys?
AysviL [449]
The keys in all rows that's sit between the touch keys are the stretch key
6 0
4 years ago
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
The process of determining that a computer program implements a simulation model as it is intended is known as
DIA [1.3K]
<span>the process of determining if a computer program implements a simulation model as it is intended is known as verification.</span>
8 0
4 years ago
Read 2 more answers
PLEASE HELP ASAP!
BlackZzzverrR [31]
A- software requirement specifications
3 0
3 years ago
Read 2 more answers
Other questions:
  • In the C-SCAN disk scheduling algorithm, the disk arm is required to move in one direction only until it reaches the last track
    7·1 answer
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • The sales management team requires that the Lead Source field of the Lead record be populated when a Lead is converted. What wou
    9·1 answer
  • The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is run.
    15·1 answer
  • The business case for using grid computing involves all of the following except: speed of computation. cost savings. agility. in
    5·1 answer
  • Which components of the​ five-component model is commonly thought of as the​ "bridge" that links the computer side of the model
    13·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • While developing a network application, a programmer adds functionally that allows her to access the running program without aut
    14·1 answer
  • You want to find the distance between two points.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!