1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
7

Help please i will give Brainliest

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
8 0

Answer:

ok I've got the answer sheet on the picture I will attach

Explanation:

I had to crop to size on my computer and found them all

You might be interested in
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
oee [108]
<h2>The Examples Of Users:</h2>
  • Form
  • Table
  • Query
<h2>The Answers Are:</h2>
  • Formatted summary of information from a database

  • User-friendly interface for adding to or retrieving information from a database

  • Stores raw data in a relational database

  • Retrieves specific information from a database. Can also be used to update, edit, and remove data
<h2>Hope it helps*^-^*All Correct!?</h2>
3 0
2 years ago
A small program that sends itself to other computers, rather than relying on user actions, is a
PSYCHO15rus [73]

Virus.

A virus is a malicious program or script that Spreads. 

Malware, however, will not spread. 

Viruses can spread without a victim's permission because it is automated to do so. 

For example, the Melissa virus would look like a file attachment that used reverse psychology to make you open it. From there, it goes through the first 50 email contacts stored on your computer and sends the virus to them from your computer. 
8 0
3 years ago
From which latin word the word computer is derived​
12345 [234]

Answer:

Putare

Explanation:

I took latin last year! Merry Christmas and hope this helps

8 0
3 years ago
A _ fire extinguisher should be used on a computer fire
Kipish [7]
Class C. <span>Class C </span>fires<span> are contained using Carbon Dioxide (CO2) </span>fire extinguishers<span> and Dry Chemical </span>fire extinguishers<span>. Sensitive electrical sources or electrical equipment such as </span>computers<span>, T.V's, or wireless devices affected by </span>fire<span> may have residue left once the </span>fire<span> has been deterred.</span>
5 0
3 years ago
A ____________ is a collection of infected IT devices that an attacker or attack group controls.
sattari [20]
The answer would be a Botnet .
8 0
2 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • What was the impact of the rise of the Japanese auto industry and the semiconductor industry in south eastern​ Asia? A. It incre
    13·1 answer
  • What allows a person to interact with web browser software?
    13·2 answers
  • Assume that an int variable counter has already been declared. Assume further a variable counterPointer of type "pointer to int"
    10·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • How can you troubleshoot Internet access problems?
    11·1 answer
  • Ava calls tech support because she is unable to send information that a customer has requested. The tech support person tells he
    6·1 answer
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
    8·1 answer
  • True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!