1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
10

A program virus infect​

Computers and Technology
1 answer:
Darya [45]3 years ago
7 0

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

You might be interested in
How many generations of computers languages have there been since the middle of the 20th century
Molodets [167]
<span>There are 4 computer language generations. First is the first generation language or 1GL, second is the second-generation languages or the 2GL, next is the third-generation languages or the 3GL, and the last is fourth-generation languages or the 4GL.</span>
4 0
3 years ago
Read 2 more answers
What is the best way to determine if a cable inside a computer is a data and instruction cable or a power cable?
Liono4ka [1.6K]
You have to trace it back to its source to determine it. Data cables are flat and cables are round.
4 0
3 years ago
The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
stellarik [79]

Answer:

Yes, The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one.But the addressale fire alram system is more reliable than a conventional system.

Explanation:

Conventional systems are hardware-based and use analog technology. where addressable fire alarm use digital technology. addressable system is generally more reliable than a conventional system mainly due to how the different systems are wired. With a conventional system, if a device’s wire is damaged or severed, its signal and the signal of other devices down the line cannot be transmitted to the control panel.

With an addressable system, both ends of the wire connect to the control panel. Therefore, if one end becomes damaged or severed, signals can still reach the control panel through the other end of the loop. In addressable systems, a device can be removed or disabled and it will not affect the other devices in the loop.

7 0
3 years ago
The K-Means algorithm terminates when:_______
gavmur [86]

Answer:

b. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

Explanation:

K-mean algorithm is one of the mot widely used algorithm for partitioning into groups of k clusters. This is done by partitioning observations into clusters which are similar to each other. When using k-mean algorithm, each of the different clusters are represented by their centroid and each point are placed only in clusters in which the point is close to cluster centroid.

The K-Means algorithm terminates when the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.

7 0
4 years ago
Which number on the image above correctly indicates the name of a folder in this URL?
Anna35 [415]
The answer is definitely C. 3
4 0
3 years ago
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • Add the function min as an abstract function to the class arrayListType to return the smallest element of the list. Also, write
    15·1 answer
  • Please answer fast! I need this now!
    15·1 answer
  • Which programming language is fortnite created in?
    11·2 answers
  • Each type of text has a purpose for the reader if you were looking to research penguins what type of text would u utilize
    11·1 answer
  • Explain the difference between good and bad table structures. How do you recognize the difference between good and bad structure
    14·1 answer
  • What are some things all boomers say.
    12·2 answers
  • Key
    6·1 answer
  • Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output i
    7·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!