1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
2 years ago
14

15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​

Computers and Technology
2 answers:
kramer2 years ago
7 0

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

DedPeter [7]2 years ago
5 0

Answer: CD Roms.  Virses can infect each other item by actually writing to the device.  For CD Roms, you must have a special writer program to write to the ROM.  

Explanation:

You might be interested in
¿Cuál es la potencia de una lámpara de incandescencia que se conecta a la red de 220 V, sabiendo que tiene una resistencia de 50
Juliette [100K]

Answer:

  • <u>1,000W</u> (rounded to one significant figure)

Explanation:

I will answer in English.

The question is:

  • <em>What is the power of a filament lamp that connects to the 220 V network, knowing that it has a resistance of 50 ohms?</em>

<em />

<h2>Solution</h2>

<em />

<em>Power</em>, <em>voltage</em>, <em>resistance</em>, and current, are related by either of the following equations:

  • P = V × I
  • P = R × I²
  • P = V² / R

Where:

  • P is power in watts (W)
  • R is resistance in ohms (Ω)
  • V is voltage in volts (V), and
  • I is current in amperes (A)

Since you know the voltage (<em>220V</em>) and the resistance (<em>50Ω</em>), you can use the last equation:

  • P = V² / R
  • P = (220v)² / (50Ω)
  • P = 968 W

Since the magnitude 50Ω has one significant figure, your answer should be rounded to one significant figure. That is <u>1,000W.</u>

7 0
3 years ago
There's a right and a wrong way to act on the internet. The right way includes practicing proper netiquette.
DaniilM [7]

Answer:

Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.

  • Be Careful With Your Tone.
  • Be Accurate and Factual.
  • Search First, Then Ask.
  • Don't Use Sarcasm Freely.
  • Be as Polite as You Are In Person.
7 0
2 years ago
Read 2 more answers
Where could identity theft access your personal information?
riadik2000 [5.3K]
From hacking into public websites where you pay and stuff, or put in a fake official window to lure out your private info.
6 0
3 years ago
Read 2 more answers
What is a coaxial cable?
grin007 [14]

Answer:

A transmission line that consists of a tube of electrically conducting material surrounding a central conductor held in place by insulators and that is used to transmit telegraph, telephone, television, and Internet signals.

Coax, short for coaxial, is a type of cable used to transmit data, the internet, video and voice communications. A coax cable is made up of an aluminum and copper shield with an outer plastic jacket (see below) with the dielectric insulator helping to minimize signal loss.

5 0
1 year ago
A new computer virus can enter the system through email or through the internet. There is a 30 % chance of receiving this virus
SpyIntel [72]

Answer:

form 0% to 50%

Explanation:

6 0
3 years ago
Other questions:
  • Use ________ resolution when recording human speech in an audio file.
    14·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • What is wrong, logically, with the following code? if (x &gt; 10) System.out.println("Large"); else if (x &gt; 6 &amp;&amp; x &l
    11·1 answer
  • When copying and pasting text, the first step is _____.
    10·2 answers
  • When did the digital revolution begin
    10·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • A sequence of repetitive operations performed to evaluate the ability of a PC to operate at peak efficiency for a defined time p
    15·1 answer
  • Explain the main components of a computer system​
    12·1 answer
  • In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used t
    11·1 answer
  • How are water resources and air adversely affected by environmental degardation?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!