1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
9

a __________ uses software and/or hardware to prevent unwanted access to a computer or computer system.

Computers and Technology
1 answer:
Crank3 years ago
6 0
Anti virus software
You might be interested in
When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
stich3 [128]
I think d is the right answer
8 0
3 years ago
Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
ANEK [815]

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

            <u>                                     </u>

1001     | 1001  0001  000

           <u>  1001                             </u>

           <u> 0000  0001             </u>

                        1000

            <u>            1001             </u>

                        0001  000

                             <u>    1 001  </u>

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                <u>                                     </u>

1001         | 1001    0001   001

                <u> 1001                           </u>

                 0000 0001

                       <u>     1001                  </u>

                            1000

                          <u>  1001              </u>

                            0001  001

                    <u>        0001  001      </u>

                                   0000

No error

7 0
3 years ago
Can anyone please help me out
Sidana [21]

Answer:

No se ve nada

3 0
2 years ago
Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output al
weqwewe [10]

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

<em> for (auto i = nums.begin(); i != nums.end(); ++i){ </em>

<em>     cout << *i <<endl; } </em>

6 0
3 years ago
Is a term used to define those providers or hospitals that have the capabilities and processes in place to be actively use certi
aksik [14]
Meaningful use (MU) i<span>s a term used to define those providers or hospitals that have the capabilities and processes in place to be actively use certified electronic health record technology.
</span><span>This term is used in a health information technology (HIT) context.
</span><span> It defines minimum U.S. government standards for </span>using<span> electronic health records (EHR) and for exchanging patient clinical data between healthcare providers.</span>
5 0
3 years ago
Other questions:
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • Odbc works on the ____ operating system.
    5·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
    14·1 answer
  • You're setting up some VMs to test an application you're considering making available to employees of the small company you work
    11·1 answer
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    11·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • A user finished working on a computer in the lab. What should the user do so
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!