1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
13

What are the top 10 most dangerous computer viruses ?

Computers and Technology
1 answer:
Solnce55 [7]3 years ago
8 0

Answer:

  • Mydoom
  • Sobig
  • Klez
  • ILOVEYOU
  • WannaCry
  • Zeus
  • Code Red
  • Slammer
  • CryptoLocker
  • Sasser

Explanation:

You might be interested in
Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
Kay [80]

Answer:

<u>False</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The Intel Centrino Technology is a product marketed and sold by the tech giant Intel, which offers a combination of their Wi-Fi and WiMax technologies in a single personal laptop. It does not offer Hyper threading Technology (HT) like some of the other Intel branded CPU's. Some of the CPU's that include hyper threading are the Core I3 series.

Therefore, based on the information stated above, we can see that the statement in the question in <u>False</u>.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
Keith would like to compare data he has collected from research. The data includes the electrical output
liberstina [14]

Answer: my test says line graph soooo….

Explanation: if its what the test says

4 0
2 years ago
True or False?
Nadya [2.5K]

False.

The different between break and continue instruction is that with break you exit the loop, and with continue you skip to the next iteration.

So, for example, a loop like

for(i = 1; i <= 10; i++){

   if(i <= 5){

       print(i);

   } else {

       break;

   }

}

will print 1,2,3,4,5, because when i=6 you will enter the else branch and you will exit the loop because of the break instruction.

On the other hand, a loop like

for(i = 1; i <= 10; i++){

   if(i % 2 == 0){

       print(i);

   } else {

       continue;

   }

}

Will print 2,4,6,8,10, because if i is even you print it, and if i is odd you will simply skip to the next iteration.

6 0
3 years ago
Photographing during the midday can produce which of the following?
deff fn [24]
It can produce harsh shadows
5 0
3 years ago
Read 2 more answers
You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
aniked [119]

Answer:

Shrink the primary partition and create a simple volume for Windows 10.

Explanation:

The EFI’s partition space, after it is shrunk, will not be enough to install your Windows 10 since by default; it can only hold a maximum space of about 250MB to 500MB. Some windows versions call this partition EFI while others refer to it as system reserved. Windows uses EFI partition to hold on to essential components that make your PC boot like boot loaders, system utilities, and a few more.

The answer is B.

When you shrink your volume, whether it is local disk C or a primary partition with plenty of free space, it will create unallocated space. Right click on the unallocated space and create a New Simple Volume that will let you format your partition, assign a drive letter, and install your Windows 10 Operating System.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • After unit and integration testing are completed, _________ testing ensures that all hardware and software components work toget
    7·1 answer
  • Which type of lenses shrinks the image in front of it rather than magnifying it? A)Telephoto B)Optical zoom C)Digital zoom D)Wid
    10·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • Assume that the int variables i and j have been declared, and that n has been declared and initialized.
    10·1 answer
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
  • How to scan a screenshot on Brainly?
    9·2 answers
  • True or False: Once you rename a field, the new field name must be used in the rest of the search string.
    7·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!