1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
15

What are the routes through with Virus transmitted into computersystem?​

Computers and Technology
1 answer:
mote1985 [20]3 years ago
8 0

Answer:

Computer viruses usually spread in one of three ways: from removable media; from downloads off the internet; and from email attachments. Although the internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

Explanation:

can I get brainliest please

You might be interested in
What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
Vera_Pavlovna [14]

Answer:

Continuous Integration

Explanation:

In continuous integration process, A program or piece of code is edited, tested and validated by team of software developers or contributors to complete and deploy the single project. This practice will improve the quality and reliability of the code.

Improvement, delivery and deployment are the three different phases, to complete the process of continuous integration.The individuals who contribute in a code or program  in terms of improvement, delivery and deployment make a team that leads to continuous integration.

So, Agile team Continuously adapt Continuous Integration to new circumstances and enhance the methods of value delivery.

8 0
3 years ago
Assume that you have an ArrayList variable named a containing 4 elements, and an object named element that is the correct type t
jonny [76]

Answer:

Option (4) is the correct answer.

Explanation:

In Java programming language ,array collection starts from 0 index location and ends in a size-1 index location. So to access the last elements the user needs to use a[Size-1] statement. so to modify the value of the last location of the array the user needs to use "a[size-1]= element;".

But when the user wants to add some new value to the end of the array list collection then he needs to use the statement--

a.add(element); //where add is a function, element is a value and a is a array list object.

Another option is invalid because--

  • Option 1 is not the correct because "a[3]=element;" modify the value of the 3rd element of the array.
  • Option 2 gives a compile-time error because add functions bracts are not closed.
  • Option 3 gives the error because a[4] gives the location of the 5th element of the array but the above question says that a is defined with 4 elements.
7 0
3 years ago
How many binary digits does a single hexadecimal digit represent?
Anna35 [415]
Four binary digits.  So letter D.


8 0
3 years ago
This tag element is the last one used in the html code sequence
satela [25.4K]

Answer:

Looking closely at the HTML code sequence, it does seem that the tag element is the endpoint from where the HTML form gets the input, like input boxes, checkboxes, radio buttons, etc. And hence it is correct to say that the tag elements are the last one used in the HTML code sequence. And in the HTML code sequence head title script and styles comes at the top, and hence we mention the script or the Javascript code basically at the last, such that the HTML code or the web page run one time at least.

Explanation:

Please check the answer section.

3 0
3 years ago
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
Other questions:
  • (I'm sorry that this question isn't school related, I can't find answers anywhere else)
    8·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
    15·1 answer
  • The decimal number 3 is ___ in binary the 2s column plus the 1s column.
    11·1 answer
  • in java how do i Write a Java program that takes ten numbers as input to calculate and print the average of the numbers.
    11·1 answer
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    12·2 answers
  • Grab the stniop or they will dissapear
    12·1 answer
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • Computer network reduces the cost of operation​
    14·1 answer
  • A thesaurus is an example of a(n)
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!