1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
7

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

Computers and Technology
1 answer:
Ann [662]3 years ago
5 0
The best answer is A, viruses.
You might be interested in
What is shouting pertaining to the internet
Ludmilka [50]
Hi!

What is considered shouting on the internet is when WHEN YOU TYPE IN ALL CAPS LIKE THIS!!! Doing this seems to make the words appear louder and more prominent. You can also add more emphasis to ALL CAP words by adding ***ASTERISKS***.
8 0
3 years ago
Given a list of twenty number count the numbers among the list
Finger [1]

Answer:

Thank you for the points<33

7 0
2 years ago
Cora is writing a program to make a motorcycle racing game. If Cora wants the speed of the motorcycle to appear on the screen wh
Alex787 [66]
The answer would be C
6 0
3 years ago
Read 2 more answers
In most presentation software, custom animations are added from the _____.
77julia77 [94]

Answer:c

Explanation:

6 0
3 years ago
Instead of terminating the series, the producers decided to extend it for an additional season. In the sentence above, which of
Leya [2.2K]
I believe it would be "Use the context to find a synonym for terminating." (Also next time try posting in the English section :) )
6 0
4 years ago
Other questions:
  • You created a database related to medicinal plants and their uses. For every plant, you would like to enter a description about
    11·1 answer
  • Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to
    14·1 answer
  • Ada lovelace designed the first computer
    7·1 answer
  • A user on a corporate laptop discovers that their bank account and social media accounts have all been hacked. The user has high
    12·1 answer
  • My study background is business. I am doing a bachelor of business administration. My major course is management information of
    15·1 answer
  • What is true regarding the cellular phone concept? a. a single radio broadcast tower system enables greater frequency reuse comp
    15·1 answer
  • The difference between the Basic Image Editing Software and Advance Image Editing Software.
    14·1 answer
  • Describe the operation of IPv6 Neighbor Discovery. ​
    7·1 answer
  • Choose the best function for the purpose.
    11·1 answer
  • Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!