1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
2 years ago
14

15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​

Computers and Technology
2 answers:
kramer2 years ago
7 0

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

DedPeter [7]2 years ago
5 0

Answer: CD Roms.  Virses can infect each other item by actually writing to the device.  For CD Roms, you must have a special writer program to write to the ROM.  

Explanation:

You might be interested in
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
LenKa [72]

Answer: Virus Hoax

Explanation:

A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.

5 0
3 years ago
Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
Artist 52 [7]

Answer:

Please check the attachment.

Explanation:

The adjacency matrix is the matrix that has nodes as rows and columns. The nodes if connected is stated as 1 or else 0. And the adjacency list representation is the list with nodes and connected nodes. The nodes that are not connected are not being listed. The diagram and list as well as matrix can be found in the attachment.

4 0
3 years ago
When cleaning a computer, you need only worry about what you can see.
almond37 [142]

Answer:

False because the inside could be dirty and cause problems.

Explanation:

4 0
3 years ago
Write 8 tips for cyber safety
alina1380 [7]

Answer:

8 tips for cyber safety

1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

8 STEPS TO STOP YOUR CHILD’S CYBERBULLY

Resist The Urge To Respond Or Retaliate

Document The Bullying

Get Help

Block The Bully

Keep Passwords Secret

Be A Teammate

Approach The Parents

Support Your Child With A Stress-Free, Supportive Home

Explanation:

5 0
3 years ago
Write a program that reads in a temperature value in °F. Create a function ConvertFahrenheit that takes that value as a paramete
larisa86 [58]

Answer:

#include<stdio.h>

void ConvertFahrenheit(float);

void main()

{

float fahrenheit_temp;

printf("Input the temperature in Fahrenheit: ");

 

scanf("%f", &fahrenheit_temp);

 

ConvertFahrenheit(fahrenheit_temp);

}

void ConvertFahrenheit(float fahren) {

float c, k;

 

c = (fahren - 32)/1.8;

k = (fahren + 459.67)/1.8;    

 

printf("Celsius = %f\n", c);

printf("Kelvin = %f", k);

}

Explanation:

  • Inside the main function, take the temperature in Fahrenheit as an input from user and call the ConvertFahrenheit function by passing it the  fahrenheit_temp variable as an argument.
  • Create the ConvertFahrenheit function for the conversion  and convert the fahrenheit value to the Celsius and Kelvin by using their conversion formulas respectively.
  • Lastly, display the result in Celsius and Kelvin.
8 0
3 years ago
Other questions:
  • Which of the following is a list of input devices?
    13·2 answers
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    11·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • What are the two types of formulas in excel
    9·1 answer
  • We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination
    12·1 answer
  • Overlay analysis is ____________, taking in data from two or more layers to create a single output layer.
    5·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • In the following code: function drawCircle(radius, x, y, color) { var circle = new Circle(radius); circle.setPosition(x, y); cir
    7·1 answer
  • Where does the turtle belong in the cladogram shown below?<br> I’LL GIVE YOU BRAINLYEST
    6·2 answers
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!