11. Which of these types of programa is bothersome but not necessarily dangerous?
A Worm
B. Adware
C. Virus
D. Trojan

Answers

Answer 1

Answer:

Virus

Explanation:

Answer 2
Your answer should be C. Virus

Related Questions

Please explain in 2-4 sentences why diligence is needed and is important in building a pc. Thank you

Answers

Diligence is required for a variety of reasons. I’m going to give you two. Remember, when you’re building a PC, you’re handling hundreds of dollars worth of hardware that are also very fragile (a cord could make all the difference). Two, you need to know and understand how to make a PC. If you have no idea how to build one, RESEARCH FIRST.

Hope this helps.

who is the three president of somalia​

Answers

Answer:

Siad Baree,Aden Adde and Aden Madobe

List 3 tanks that a computer can perform ​

Answers

Answer:

Input, output, processing, and storage

Explanation:

Computers deal with input, how much information and letters and whatnot is typed or inputted on a computer. They also deal with output, the result of an input value. In between the input and output stages, they process the information before returning the output value. They have storage for history and a short RAM list, so they can remember all the input values inserted recently.

What is the fastest internet?

Answers

Answer:

Xfinity

Explanation:

An evaluation of the Best Internet Service Providers found Xfinity offers the fastest internet plan. Its fiber-based Gig Pro plan is the company's quickest, featuring equal download/upload speeds of 2,000 Mbps.

role of computers in everyday life​

Answers

Answer:

In modern word everything around us like GPS, ATM machines, cell phones, petrol pumps, portable play stations and all other modern devices use computer controlling units to conduct their featured operations. Surely computers have very elaborated role in daily day life of humans.

Explanation:

hope it helps thxs

what maybe the possible disadvantage of convergence in our country using technology?​

Answers

Answer:

Advantages of Access

- Inexpensive

- Efficient

- Convenient

- Faster

Disadvantages of Access

- Technology Crashes

- Loss of Memory

- Safety

Advantages of Connectivity

- Staying in Touch

- You Can Work Anywhere

- You Can Never Get Lost

Disadvantages of Connectivity

- Not Safe

- Risk of Hacking

- Detached from Reality

- To Reliant on Technology

Advantages of Convenience

- Don't Have to Carry Lots of Equipment

- Never Bored

- Never Miss a Moment on Camera

Disadvantages of Convenience

- Tech. Break Down

- Addiction

Advantages of Immediacy

- Become Expectant

Disadvantages … (more)

Technological Ideas

This space is for those who're new or who've already advance in technology.

Technology Solution

A place to share technological knowledge

Freelancer's Legit Gigs

Let's help each other to make money online!

Life is Beautiful

All my answers on Life, General rants are here.

Tech Lounge

anything tech related

Entrepreneurial Mindset

A space to think like an entrepreneur.

Artificial Intelligence 62

AI is leading many of our technical industries.

iOS devices

iOS apps and devices

hackology

space about cyber-security

Everything iPhone

Space to share, discuss, and explore everything related to iPhone & iPhone only

View More Spaces

Zisse Mueller, Marketing Operations Specialist at IT Central Station

Answered April 23, 2019

There are pros and cons when it comes to using converged technologies.

For example, this user writes about FlexPod, a converged infrastructure:

Pro: “It scales well. It allows us to have very flexible architecture but to have the same level of simplicity that we'd normally expect in hyper-converged environments.”

Con: “I'd like to see a little bit simpler management pane. Using UCS Director to front everything is good but for a lot of that upper mid-market, it's probably a little bit of overkill for what they need. They just want a nice, simply portal to go through and see what's going on. So if … (more)

Promoted by BigCommerce

How does BigCommerce compare to Magento for mid-market and enterprise-level brands?

Victoria Fryer, Content Marketing Manager at BigCommerce (2019-present)

Answered July 23

Magento, an open-source ecommerce software with both on-premise and cloud-hosted options, is often top of mind for businesses seeking an enterprise-grade shopping cart software and content management system (CMS). But it’s definitely not the only option. Many businesses today are looking t

(Continue reading in feed)

Related Questions

More Answers Below

What are advantages and disadvantages of converged networks?

What are the five advantages and disadvantages of the use of digital technology?

What are the disadvantages of technology?

Anonymous

Answered October 13, 2016

You have not defined “convergence technologies” and thus this answer cannot be answered.

1.5K viewsView Upvoters

Yasaswi Kompella

Answered June 8, 2016

this is the disadvantage

232 views

Related Questions

What are advantages and disadvantages of converged networks?

What are the five advantages and disadvantages of the use of digital technology?

What are the disadvantages of technology?

What are some examples of convergence technologies?

What is the meaning of Converging technology?

What are the disadvantages of digital technology?

What are some disadvantages modern technology has brought us?

What are the advantages of technological transfers?

What are the disadvantages of technological convergence?

What are the disadvantages of technology nowadays?

What are the pros and cons of technology?

What is the advantage and disadvantage of information technology?

What are the disadvantages of technology in education?

What are the disadvantages of a computer?

What are the disadvantages of convergence?

Related Questions

What are advantages and disadvantages of converged networks?

What are the five advantages and disadvantages of the use of digital technology?

What are the disadvantages of technology?

Explanation:

Question 4: What will be the output of the code? Show a complete analysis.

#include
int main(void)
{
int A[3][3]={{1,4,3},{6,2,4},{-3,8,2}};
int s;
for(int i = 0; i<=2; i++)
{
S = ALOIi]+A[111]+A[21i];
printf("%d",s);
}
return 0;
}

Answers

Answer:

The output of the code is 8

Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution method to verify your answer.

Answers

Answer:

Follows are the solution to this question:

Explanation:

The scale of the subproblem for a node is [tex]\frac{n}{2^i}[/tex]  at depth.  

The tree then has lg n + 1 and [tex]4^{lg n} = n^2[/tex]leaves.  

Complete costs for all depth I nodes for I = 0. 1 , 2, ......, lg n-1 is:[tex]4^i ( \frac{n}{2^i}+ 2 ) = 2^i n + 2\times 4^i.[/tex]

[tex]T(n)= \sum_{ i = 0}\lg n - 1( 2^i n + 2 . 4^i )+ \Theta (n^2)\\\\[/tex]

        [tex]= \sum_ {i = 0} \lg n - 1 2^i n + \sum_{i = 0} \lg n - 12 \times 4^i + \Theta (n^2)\\\\= [ \frac{ 2\lg n - 1}{ 2 - 1} ]n + 2 \times [ \frac{ 4\lg n - 1}{ 4 - 1} ]n + \Theta (n^2)\\\\= ( 2\lg n - 1) n] + (\frac{2}{3})( 4\lg n - 1)+ \Theta (n^2)\\\\= (n-1)n - \frac{2}{3} (n^2 -1) +\Theta (n^2)\\\\= \Theta (n2)\\[/tex]

verfify the value:

[tex]\to T(n) \leq c (n^2 - dn) \\\\T(n) = T(n) = 4T((\frac{n}{2}) + 2) + n \\\\ \leq 4c [ ((\frac{n}{2}) + 2)2 - d((\frac{n}{2}) + 2) ]+ n \\\\ \leq 4c [ (\frac{n^2}{4} + 2n + 4) - \frac{dn}{2} - 2d)]+ n \\\\\leq cn2 + 8cn + 16c - 2cdn - 8cd + n\\\\\leq cn2 -cdn + 8cn + 16c - cdn - 8cd + n\\\\\leq c(n2 -dn) - (cd- 8c - 1)n - (d - 2). 8c\\\\\leq c(n2 -dn),\\\\[/tex]

Where there is the last stage for  [tex]\to cd - 8c -1 \geq 0[/tex].

PLEASE HURRY!!!!

Which statements will ask the user for a number? Select 2 options.
A) answer = in(“How many sodas do you want? “)
B) answer = in(How many sodas do you want? )
C) answer = input(How many sodas do you want? )
D) answer = input("How many sodas do you want? ")
E) answer = input('How many sodas do you want? ')

Answers

Options D and E are correct. The input function takes input from the user, which in this case is a number.

Answer:

answer = input('How many sodas do you want? ') and

answer = input("How many sodas do you want? ") is the correct answer. so in other words D and E are correct.

I took the quiz myself

10. What Windows feature prevents unauthorized system changes?
A. UAC
B. DVI
C. NFC
D. WPS

Answers

Answer:

wps

Explanation:

it is more safer to use

Today, there are many computer categories. A(n) ________ is the category for the world's fastest computers. ________ computers are large, expensive devices capable of simultaneously processing data for thousands of users. Computers used by Google and Web service providers are classified as________. Personal computers come in several varieties. A(n)________ computer fits on a desk, runs on power from an electrical wall outlet, and can be housed in a horizontal case or vertical case. Three categories of portable computers include tablets, smartphones, and clam-shell style________ computers. Selecting a digital device requires consumers to select a platform based on form factor and operating system. MacOS is the operating system that runs on Apple laptops and ________ computers. The operating system for iPhones and iPads is ________ . The________ operating system from Microsoft runs on laptop and desktop PCs, whereas a derivative version is designed for tablets and phones. The open source community produces Linux for desktops and servers. This family of operating systems also includes Chrome OS, and________ , which is popular for tablets and smartphones.

Answers

Answer:

Supercomputer

Mainframe

Servers

Desktop

Laptop

Mac

iOS

Windows

Android

Explanation:

Speed is salient characteristic of supercomputers. The Mainframe computers are usually used by large companies and are very expensive with large processing capability. Servers enables thw possibility of establishing connections with service providers such as Google and other related companies. Desktop computers are those which aren't designed for portability or being easily carried around. The Laptops on the other hand are more compact and easily carried around. Mac are operating systems associated with Apple computers and iOS is the operating system used on iPhones and other Apple smart mobile devices. Windows is the me of the operating system used by Microsoft. Android is also a popular operating system used on smartphones.

Microsoft PowerPoint is the best example of Multimedia Presentation Software. *


True or false​

Answers

Answer:

true yes it is a good example

A collection of four bits and half bytes is.............. plzzz help​

Answers

Answer:

Nibble

Explanation:

What common feature of well-made web apps helps them stand out from static email advertisements?

Answers

Answer:

For the test, I litterally came here while taking it and couldn’t find an answer, I got a horrible 70.. but all I know it’s not C or D

Explanation:

I took the test, sorry I don’t have an actual answer

Please help asap
what does the following statement describe?


a ______ allows you to divide a single system into multiple versions known as guests that run on ______that connect to the physical hardware.

options for the first blank
container
hypervisor
server

options for the second blank

virtual machines
cloud services
host machines

Answers

Answer:

hypervisor and cloud services

Explanation:

could u mark me as brainliest?

Answer:

The correct answers are:

Hypervisor

Virtual Machines

Explanation:

I got it right on the Edmentum test.

A Software application that access web application and websites

Answers

Answer:

Web Application

Explanation:

#carryonleraning

The 2960 switches have been taken out of the box and cabled, and PC2 can communicate through R1 with the rest of the IP network. However, no configuration has been added to either SW1 or SW2. As a result, the network engineers sitting at a management station to the right of R1 cannot ping or telnet to SW2. Required:
What configuration commands, when entered in the correct order on SW2, allow the network engineer to ping or telnet to SW2 from the management station?

Answers

The correct order of configuration commands on switch 2 (SW2) that would allow the network engineer to successfully ping or telnet to SW2 from the management station are:

Enter IP address of switch 2 (SW2).Set IP default-gateway.Configure interface VLAN 1.No shutdown

What is a command?

A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:

RoutersWorkstations (computers)

In this scenario, the network engineer should use the following configuration commands on switch 2 (SW2), so as to successfully ping or telnet to SW2 from the management station are:

Enter IP address of switch 2 (SW2).Set IP default-gateway.Configure interface VLAN 1.No shutdown

Read more on a switch here: https://brainly.com/question/13243868

Write a function that asks a user for his/her name and movie
watched. Then the function prints a greeting message.
A session should look like the following:
What is your name? Ahmed
Which movie have you seen? The Battle of Algiers
The printed message is: "Today, I learned that Ahmed watched
The Battle of Algiers movie!“ (Output)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

                     

The code is written in C++

/******************************************************************************

                             Online C++ Compiler.

              Code, Compile, Run and Debug C++ program online.

Write your code in this editor and press "Run" button to compile and execute it.

*******************************************************************************/

#include <iostream>

#include <string>  

using namespace std;

void display()

   {

       string yourName;

       string watchedMovie;

       cout<<"What is your name?  ";

       cin>>yourName;

       cout<<"Which movie have you seen?  ";

       cin>>watchedMovie;

       cout<<"Today, I have learned that  " <<name<<" watched "<<watchedMovie<<" movie";

   }

int main()

{    

   

   display();

   return 0;

}

 

How is technology a mode of revealing?​

Answers

Answer: First, the essence of technology is not something they make; it is a mode of being, or of revealing.

Explanation:  This means that technological things have their own novel kind of presence, endurance, and connections among parts and wholes. They have their own way of presenting themselves and the world in which they operate.

Match each HTML tag to its function.





defines a new paragraph
defines a single line break
defines a heading style
defines a row in a table

Answers

Answer:

<p></p> is a new paragraph

<br> is a line break

h1: defines new heading style

<tr> defines new row in a table

Your desktop, internet explorer, and the media player can be started from this area on most computers

Answers

The answer is quick launch

Diseconomies of scale are likely to result from which one of the followings?

Answers

In microeconomics, diseconomies of scale are the cost disadvantages that economic actors accrue due to an increase in organizational size or in output, resulting in production of goods and services at increased per-unit costs. The concept of diseconomies of scale is the opposite of economies of scale.

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

In Microsoft PowerPoint, a _____ gives viewers a visual image of data, such as a line graph or a three-
dimensional bar graph, instead of just numbers listed in a table.

Answers

Answer:

chart

Explanation:

on edg

9. Which of these is not a factor in password management?
A. Confidentiality
B.Expiration
C. Guest
D. Complexity

Answers

Answer:

I don't really know but I think it's guest

PLEASE HURRY!!!!

What will be the output of the following program? Assume the user responds with a 5 for the first number and a 4 for the second number.

answerA = input("Enter a number. ")
answerB = input("Enter a second number. ")
numberA = int(answerA)
numberB = int(answerB)
result = numberA + numberB / 2
print ("The result is" , result)

A) The result is7.0
B) The result is 4.5
C) The result is4.5
D)The result is 7.0

Answers

Answer: The result is 7.0

Explanation:

see image

The output of the given following program is the result is 7.0. The correct option is A).

What is the output in programming?

Data can be transferred between the CPU and a peripheral, like a network adapter or an ATA storage device, using programmed input/output (PIO). The program's instructions start each data item transfer, involving the CPU in each transaction.

The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.

Therefore, the correct option is A) The result is 7.0 is the result of the given program.

To learn more about output in programming, refer to the link:

https://brainly.com/question/30141972

#SPJ2

How would YOU define AI?

Answers

Answer:

If you meant by artificial intelligence then it’s the simulation of human intelligence processes by machines especially computer systems

Explanation:

Hello!

Answer:

An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file.

Wish you luck!

How to trigger watchers on initialization in vue.js ?

Answers

Answer:

variable when the component is mounted. This triggers the watchers which then triggers an emit i have in the watcher. I do not want the emit to happen when the variable is only being initialized. The variable is from the data section of the vue component.

What are some of the challenges of note-taking? Check all that apply.

It can take up a great deal of time in class.
It can lessen preparation time before tests.
It does not support retention for the student.
It can be distracting in the middle of a lecture.
It can cause the student to miss information.

Answers

Explanation:

it can take up a great deal of time in class.

it can be distracting in the middle of a lecture.

it can cause the student to miss information.

These are some of the challenges of note taking:

It can take up a great deal of time in class.It can be distracting in the middle of a lecture. It can cause the student to miss information.

Note-taking can be described as the jotting of important details on a book or notepad during a lecture or class.

Note taking is very important because the student can also refer to it when needed to extract important information.

With its advantages, it also has some disadvantages for the learner.

The learner may become too engrossed in his note taking and end up missing out on other things that are being done in the classroom.

Also it could cause the student to stop listening further to what is being taught. They may become too engrossed with copying what they had heard earlier.

Read more on note-taking here: https://brainly.com/question/17184401

What is the name of a coding sequence that is executed multiple times in a program?

Answers

Answer:

Loop, or Iterator

Explanation:

For example, a "for" loop or a "while" loop to create a block of code that will execute a certain number of times.

Answer:

C - a loop

Explanation:

on edge pls mark brainiest

Other Questions
What's 5x5+6x3-1 Me brain is no working, please help how can human organ trafficking be controlled? 4 points A toy store had 27,436 customers last week. Which digit is in the thousands place in 27,436?A.2B.3C.4D.7 2)Using the context clues, identify the meaning of the word as it is used in the sentence.Mary looked around at the PRISTINE kitchen, wondering who had taken the time to clean.stricthelp; aidvery cleanpolitepass on; hand downdreadful; shockingexcitedguiltflood; downpourfacial appearance A client is considering purchasing a new high efficiency pump and motor, with an initial cost of $10,000. The pump has a lifetime of 15 years and is estimated to save approximately $1,000 per year. There is an additional maintenance cost of $300 per year associated with this new pump. The pump will have a salvage value of $0 at the end of its lifetime. Assume the interest rate is 4%. What is the annual value of the pump I need help !!!! Gene says that -2 1/8 is less than -2.25 is he correct explain your answer ! y=x+1 x-y=1 solve by substitution For the equation, 9x = 3y. Write an EQUATION describing y as a function of x What is the denotative meaning of sickly?Does sickly have a positive, negative, or neutralconnotation? negativeWhat is the denotative meaning of canopy?[CASSIUS.] Coming from Sardis, on our formerensignTwo mighty eagles fell, and there they perched,Gorging and feeding from our soldiers' hands;Who to Philippi here consorted us.This morning are they fled away and gone,And in their steads do ravens, crows, and kitesFly o'er our heads and downward look on us,As we were sickly prey. Their shadows seemA canopy most fatal, under whichOur army lies ready to give up the ghost.- The Tragedy of Julius Caesar,William ShakespeareWhat is a connotation associated with the word canopyas it is used in the passage? 6) Andy is going kyacking. He has $341 to spend on parking and paddles. Parking costs $30 and paddles cost $45. 20 per person. Determine how many people can go kyacking Why do saturated fatty acids have straight structures, while unsaturated fatty acids have bent structures Which complex is not involved in the establishment of conditions for atp synthesis?. (URGENT) What was the Passover lamb before Jesus died? Refer to 1 Corinthians 5: 6-8. PLEASE NOT THAT THE ANSWER IS NOT PASCHAL LAMB. 1. What is the relationship like between Jimmy Valentine and the warden of inprison? Use evidence from the text to support your answer. Find the curved surface area of a cone with base diameter 30 cm and height 40cm. Represent the following expressions as a power of the numbera(a0):((a^2)^2)^5(a^15) Describe the failure of the banking system. During the Great Depression. Dont send me any files or links. I want the answer typed and make sure it wont get deleted before you submit your answer please. I will give you a brianlist of whoever follows the directions right. Please do it right. How can you make a deference in democracy? In 5-7 sentences Barrios Communications is a provider of satellite television services. It will install a satellite dish free of charge for any customer that agrees to a one-year service contract at a price of $50 per month. Installation costs Barrios $150. Customers typically remain with Barrios for much longer than the one year required, an average of 10 years (i.e., 9 years beyond their contractual obligation). Barrios enters into a contract under the terms described above on January 1, 20X1.Required:1. What amount of revenue should Barrios record related to the contract in 20X1?2. What amount of expense related to the contract should Barrios record related to the contract in 20X1? How did the bill of rights help resolve the differences between these two view points