1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
6

Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?

Computers and Technology
2 answers:
statuscvo [17]2 years ago
4 0

Answer:

B. it is a code that creates multiple copies on loading and damages the system

Sedbober [7]2 years ago
3 0
B. It is a code that creates multiple copies on loading and damages the system
You might be interested in
Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording
devlian [24]

Full question attached

Answer and Explanation:

1. There’s need to ask for help and advice from people who have the

knowledge and skills in making a simple electrical gadget.

2. Adapter is used to plug appliances that are far from the main power source.

3. Do not touch the metal pipes while you are doing electrical repairs.

4. Shut off the power at the main switch or circuit breaker and unplug the equipment when working on electricity.

5. Pliers are tools used to grip, pull or cut electric wires.

From the above, we have corrected some of the errors that could be made in everyday home appliances or home electricity. In number 4, it is also worthy of note that shutting off power at the main switch will only require emergency situations otherwise we need only shut off the one for the problem circuit and leave the rest.

5 0
3 years ago
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
Which of these tools stick to the edge of an image, thus making it easy to select the shape of an image (adobe Photoshop)
elena55 [62]

Answer:

Number 2 Polygonal lasso tool

Explanation:

5 0
2 years ago
Java what are synchronized functions.
adelina 88 [10]

<h2>answer:</h2>

Synchronized method is used to lock an object for any shared resource. When a thread invokes a synchronized method, it automatically acquires the lock for that object and releases it when the thread completes its task.','.

4 0
2 years ago
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
2 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • What is the difference between a key and a superkey?
    10·1 answer
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • Are you allowed to copy and paste answers on brainy to give answers to other people?
    5·2 answers
  • Your disaster recovery plan calls for tape backups stored at a different location. The location is a safe deposit box at the loc
    13·1 answer
  • Que relacion tiene Las palabras: fermentacion-vino y clonacion- dolly​
    9·1 answer
  • Hyperlink is a term used to refer to the specific manner of specifying the address of a website. Write reason for true or false.
    10·1 answer
  • Where else can the computer send the results of processing other than to output​
    13·1 answer
  • How does a Cloud-first strategy differ from other approaches to Cloud?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!