1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
13

A _____ can be destructive and can modify or delete files that may not be recoverable.

Computers and Technology
1 answer:
umka21 [38]3 years ago
6 0
Virus

Hope this helps
You might be interested in
If a driver who is under the age of 21 is stopped by a law enforcement officer and has a blood alcohol level of 0.02 or greater
lions [1.4K]

having their driving privilege suspended for six months.

5 0
3 years ago
How should you schedule a meeting with someone in another time zone?
gavmur [86]

If you know what timezone they're in, try to work out what time in your own timezone your free, then tell the other person to do the same. Tell them what times in your timezone and the other can search up what the time is in their own timezone. If there is a specific time when you are both free, use that.

Ex:

You live in the U.S. but you have a meeting with someone in the U.K. You're only free at 4:00pm-6:00pm and they're only free from 10:00am-11:00am. 11:00am in England is 4:00pm in the U.S. so do at that time!

Hope this helps!

7 0
3 years ago
Containers for contaminated sharps must have several characteristics. What’s missing from the list? PuContainers for contaminate
Nadya [2.5K]
All sharps containers must be stored upright,be puncture-resistant, be labeled or color-coded red & leakproof on both the sides & the bottom! The last one is the one missing!
4 0
3 years ago
Read 2 more answers
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
Look at the following structure declaration.
myrzilka [38]

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

7 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • You use_____ to view an XPS file
    10·1 answer
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • What type of data can we enter in a spreadsheet?
    11·1 answer
  • What two variables does mass depend on?
    5·1 answer
  • Which of the following is an input device? (Select all that apply)
    13·1 answer
  • For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p
    11·1 answer
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • Give 4 examples of mnemonic codes, and what do they do?
    15·1 answer
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!