1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
6

16 POINTS

Computers and Technology
1 answer:
Nostrana [21]3 years ago
6 0
It think it's a Nested List.
Im so sorry if this is wrong
You might be interested in
A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
schepotkina [342]

Answer:

macro virus

Explanation:

Macro virus -

A micro virus is written in a micro language  , where the programming language is present in the application of software like the powerpoint , excel , microsoft office , word processor , etc.

These virus gets activated as soon as the file is opened and then the virus starts to spread all over the system .

The virus may be send via email , and as soon as the file is opened , the macro virus gets activated.

Hence, from the given information of the question,

The correct term is macro virus.

6 0
3 years ago
Read 2 more answers
Code a program that gets all possible solutions of a string using 3 for loops. Actual question attached
Nikitich [7]

\tt x=int(input("Enter\:first\:no:"))

\tt y=int(input("Enter\:second\:no:"))

\tt z=int(input("Enter\:third\:no:"))

\tt for\:x\:in\: range (3):

\quad\tt for\:y\:in\:range(3):

\quad\quad\tt for\:z\:in\:range(3):

\quad\quad\quad\tt if\:x!=y\:and\:y!=z\:and\:z!=x:

\quad\quad\quad\quad\tt print(x,y,z)

8 0
2 years ago
3. Write a script that uses an anonymous block of PL/SQL code that attempts to insert a new flight into the flights table for fl
Irina18 [472]

Answer:

We will use script in oracle and SQl(Structured Query Language) and use of algorithms like cipher for encryption to insert a new flight into the flights table for the flight number 165 and that Cipher will show the desired message.

5 0
3 years ago
Why do people take off the keys on the school computers
beks73 [17]

Answer:

is this supposed to be a joke-

Explanation:

cuz i dont get it

8 0
2 years ago
Where can a user find available templates and themes in PowerPoint?
jenyasd209 [6]

Can look under the design tab to find a handful of slide themes to choose from including an option to browse from to get a theme that you personally saved.

3 0
3 years ago
Other questions:
  • Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
    13·1 answer
  • It is ________ to pass an argument to a function that contains an individual array element, such as numbers[3].
    5·1 answer
  • Write a full class definition for a class named Averager, and containing the following members:______An data member named sum of
    6·2 answers
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • ​open-source software is​ ________.
    11·1 answer
  • The hypothalamus controls the anterior pituitary by means of: a. releasing hormones b. second messengers c. third messengers d.
    14·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • Select the correct answer.
    7·2 answers
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data elemen
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!