1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
6

Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?

Computers and Technology
2 answers:
statuscvo [17]2 years ago
4 0

Answer:

B. it is a code that creates multiple copies on loading and damages the system

Sedbober [7]2 years ago
3 0
B. It is a code that creates multiple copies on loading and damages the system
You might be interested in
Write a computer program to tell if the number is even or odd please
vovikov84 [41]
There you go :) Written in C# you can add using tags yourself I believe

3 0
3 years ago
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
wel

Answer:

Windows\System32\drivers folder.

Explanation:

Eric operates on such a computer which has some failure on system's driver. Although the specific system may not be operational, he will locate the system driver title. Inappropriately he has no Connectivity to the internet.

Windows\System32\drivers directory could move to him to show the file of the system driver. Thus, the following answer is correct according to the given scenario.

3 0
3 years ago
What US agency originally started ARPANET?
RUDIKE [14]
<span>c. Department of Advanced Research Projects Agency</span>
8 0
3 years ago
Classify each of the cost items (a-h) into one of the business functions of the value chain Cost Item Value Chain Business Funct
rewona [7]

Answer:

Explanation:

a)In this process, the power, electricity, water, etc consumed by the Production department are assembled.

b)In this department, the products are processed and shipped to the retail customers. The costs required for shipping the Latitude line of products comes under the Distribution department.

c)The activities like planning, designing, white box and black box testing are done in the Design process of a product.

d. Salary of computer scientist working on the next generation of servers related to Development.

e. Cost of Dell employees' visit to a major customer to demonstrate Dell?s ability to interconnect with other computers related to Customer Service or Marketing.

f)The cost required for testing the products comes under the Research and development.

g)Marketing department includes the costs of market research, selling the products and other business costs.

h)Purchasing the cartridges from the external suppliers comes under the production department.

7 0
3 years ago
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
Kruka [31]
D. each table must depend on the entire foreing key
4 0
1 year ago
Other questions:
  • An online game is played with two dice, explain why decomposition will be used in creating the algorithm for the game?
    9·2 answers
  • After machine language, what is the next most basic type of programming language, which still uses many length strings of numera
    5·1 answer
  • An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they c
    15·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • You have deployed several 802.11b wireless networks at your company's location. Recently, users complained that they were having
    9·1 answer
  • Write the definition of a function isSenior, that receives an integer parameter and returns true if the parameter's value is gre
    13·1 answer
  • What can you do if brainstorming only gives you a small or incomplete idea?
    15·1 answer
  • Please help. 10 points
    5·2 answers
  • Pls answer will give brainlest dont answer if you dont know Upload your 300-word essay containing the following: the definition
    5·1 answer
  • What is phishing?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!