1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Soloha48 [4]
3 years ago
14

Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often dama

ges resources on the systems where it is found?
Computers and Technology
1 answer:
Maksim231197 [3]3 years ago
7 0
Its know as a virus (a program created to spread and maliciously harm computers)
You might be interested in
What is another word for microchips operating systems input methods and everything in between?
lord [1]
The answer is computer. A computer is made up of microchips (CPU and GPU), an operation system (macOS or Windows), input methods (keyboard and mouse), and other parts.
7 0
3 years ago
You try to enter your name into a cell that accepts a numeric value. What error would you receive
Phoenix [80]
Because it say numeric value that means numers and words/letters aren't numbers so it will say not a numeric value :) hope it helps

7 0
2 years ago
Read 2 more answers
"omr, ocr, and micr are all types of ________."
Juliette [100K]
OMR, OCR and MICR are all types of character and mark recognition devices. They are scanners <span>that are able to recognize special </span>characters and marks<span>.
</span>OMR stands for Optical Mark Recognition,which <span>senses the presence or absence of a mark.</span>
OCR stands for Optical Character recognition, which reads special preprinted characters by light source.<span>
MICR stands for Magnetic Ink Character Recognition, where  </span><span>machine reads character made of ink containing magnetized particles.
</span>
4 0
2 years ago
Read 2 more answers
The material placed around the ignition device to feed the flame in arson is referred to as
andrezito [222]
<span>The material placed around the ignition device to feed the flame in arson is referred to as </span>plant.
8 0
3 years ago
Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which
Flauer [41]

The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

<h3>What is SRS document?</h3>

SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.

Different types of requirement-

  • A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
  • B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
  • C. Inverse Requirements- It defines that what a system can not do.
  • D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
  • E. Non-Functional Requirements-This includes attributes of system, performance, security etc.

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.

Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

Learn more about the SRS document here:

brainly.com/question/26161636

#SPJ1

4 0
2 years ago
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • The application layer in the tcp/ip protocol suite is usually considered to be the combination of ________ layers in the osi mod
    12·1 answer
  • Point: A Point in a two dimensional plane has an integer x coordinate value and an integer y coordinate value.
    12·1 answer
  • What is the trade-offs in time complexity between an ArrayList and a LinkedList?
    7·1 answer
  • jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    11·2 answers
  • What is the second stage of information processing cycle​
    10·2 answers
  • How network diagram help in scheduling a project? Draw activity network diagram as per given
    7·1 answer
  • Describe your WGU program, including two specific requirements that this degree has for completion.
    14·1 answer
  • Write essay about pokhara​
    5·1 answer
  • Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!