1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
2 years ago
14

15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​

Computers and Technology
2 answers:
kramer2 years ago
7 0

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

DedPeter [7]2 years ago
5 0

Answer: CD Roms.  Virses can infect each other item by actually writing to the device.  For CD Roms, you must have a special writer program to write to the ROM.  

Explanation:

You might be interested in
Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(n/4) + 4n +
In-s [12.5K]

Answer:

Explanation: see attachment below

4 0
3 years ago
1. Write an expression whose value is the result of converting the str value associated with s to an int value. So if s were ass
maksim [4K]

Answer:

The solution or expression for each part is given below:

  1. int(s)
  2. s[len(s)-1]
  3. last.capitalize()+','+first.capitalize()
  4. str(x)
  5. s[5:]

Explanation:

Following are attached the images that show how these expressions will be used. I hope they will make the concept clear.

All the images below are respective to the questions given.

7 0
3 years ago
The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
masya89 [10]

Answer: Three way handshake

Explanation:

The three way handshake is the process in which it established a connection at the destination device in the network. It also verifies the currently active services in the network.

The three way shake process basically uses in the transmission control  protocol(TCP) and it also inform to the destination device about the communication session.

Three way handshake process are properly understand in the TCP segment header by the various values in the two host exchange.

4 0
3 years ago
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
EastWind [94]

Answer: Insertion steganography

Explanation: Insertion steganography is the way of encrypting the data with the help of a regular files and message. It is encrypted by the ordinary files because the identification of files can be neglected. This process is carried out just for the protection purpose in extra form and gets decrypted  in the destination port .It has the working based on the replacement of the bits in a file .

8 0
3 years ago
toThePowerOf is a method that accepts two int arguments and returns the value of the first parameter raised to the power of the
inessss [21]

Answer:

cubeVolume = toThePowerOf(cubeSide, 3)

Explanation:

The function toThePowerOf, receives two int arguments say, a and b, where a is the first argument and b is the second argument as follows:

toThePowerOf(a,b)

The function returns the first argument(a) raised to the power of the second argument (b) i.e a ^ b as follows:

toThePowerOf(a, b){

return a^b

}

In the call to the function, the first argument a, is replaced with the variable cubeSide and the second argument b is replaced with the value 3.

Hence, the returned result becomes cubeSide ^ 3 which is then stored in a variable cubeVolume as follows:

cubeVolume = toThePowerOf(cubeSide, 3)

6 0
3 years ago
Other questions:
  • ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
    10·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • What command displays a computer s network settings?
    5·1 answer
  • In general, the farther you are from other road users, the A. lower your crash risk B.higher your crash risk C. slower they are
    6·1 answer
  • In PowerPoint online what can you add to your presentation from the insert tab
    8·2 answers
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • Hazel has taught herself a variety of computer languages. She enjoys using her knowledge to write the programs for applications
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!