A software program that migrates through networks and operating systems (OS) by attaching themselves to different programs and databases is a: virus.
What is a virus?A virus can be defined as a harmful or malicious software program that is designed and developed to migrate through networks and operating systems (OS) of a computer (host), especially by attaching themselves to different programs and databases.
This ultimately implies that, a virus is a malicious software program which causes damage to a computer and user files, if not detected and properly managed.
Read more on virus here: https://brainly.com/question/26128220
There are many Deaf-owned restaurants, including the Big Mango Café, in the WHAT
There are many Deaf-owned restaurants, including the Big Mango Café, in the world today.
What is Deaf Restaurants?These are known to be Restaurants that are known to be run by Deaf people. It is said to be Conquering the World as a lot of more, restaurants that is more that 25 of them are been managed or served by people who are Deaf.
Note that they often sells Food of all kinds and as such, there are many Deaf-owned restaurants, including the Big Mango Café, in the world today.
Learn more about restaurants from
https://brainly.com/question/17619957
#SJ1
For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation, she found it difficult to read. What could Matilda do to make her slides easier to read?
a Change the background to white and the text to dark green.
b Change the background to yellow.
c Change the text to dark green and the background to black.
d Change the text to pink
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?.
Answer:
Cookies.
Explanation:
It is a small text file that a website can place on your computer's hard drive to collect information about your activities on the site or to allow the site to remember information about you and your activities.
Name two utility programs included in an operating system:
Answer:
A file management system and a disk defragmenter
Explanation:
By age 10, an American child has probably worn down well over 700 crayons!
true or false
Answer: true
Explanation:
you’ve gone thru 10 years of coloring
Answer:
The answer is : True
Explanation:
Thats a lot of years of coloring. you've probably gone through more than 700 ..
Hope it helps :)
Pls mark brianleist :P
`
`
`
Tori
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
The attack that is said to Utilized by China's so-called "Great Firewall" is DNS poisoning.
What is DNS poisoning attack?Domain Name Server (DNS) spoofing poisoning is known to be called DNS cache poisoning.
This is known to be a form of an attack that is said to make changes to DNS records and then they often used to redirect the users online traffic to a website that looks like the one that a person is intending to go to and they are often fraudulent.
Note that the attack that is said to Utilized by China's so-called "Great Firewall" is DNS poisoning as it takes one to a fraudulent site.
Learn more about web pages from
https://brainly.com/question/9060926
#SJ1
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data
Answer: Encryption
Explanation:
I did computer science as my major :)
please help I need to turn this in by 8 pm but it's not working it's almost 6
Answer:
You can re-open your browser and refresh the page. Clear your browser's cache and cookies. Turn off any plugins and extensions then reload the page. Try opening the page using another browser.
Explanation:
Have a great rest of your day
#TheWizzer
What is the most common form of host-based IDS that employs signature or pattern-matching detection methods
The two primary methods of detection are signature-based and anomaly-based. Any type of IDS (HIDS or NIDS) can detect attacks based on signatures, anomalies, or both. The HIDS monitors the network traffic reaching its NIC, and the NIDS monitors the traffic on the network.
Dumpster diving is a low-tech means of gathering information that may be useful for gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving
User
Application Software
Operating System
Hardware
Assignment #1
•Explain the meaning of this graphics organizer base on what you have learned from this lesson.
• Is an "app" same in meaning with "application"?
This graphics organizer base talks about Software and how it is divided into two groups such as the operating systems and application software.
What are Software?Software are said to be often shared into two categories such as:
The operating systems The application software.Note that the Operating systems functions by helping the hardware and produce a kind of interface between the hardware and its user while the Application software is said to be a stage of a programs that help the user to do anything meaningful just as seen in the diagram.
Conclusively, The word "app" has the in meaning with "application". It is known to be the short form of application.
Learn more about Application Software from
https://brainly.com/question/1538272
Which specific type of attack occurs when a threat actor redirects network traffic by modifying the local host file to send legitimate traffic anywhere they choose
The specific type of attack that occurs when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning.
What is DNS poisoning?DNS poisoning is known to be a type of attack where the hacker uses a method that alters some seen vulnerabilities that are found in the domain name system (DNS).
Conclusively, The type of attack that takes place when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning as it alters it and change it to what they want thereby redirecting users elsewhere.
Learn more about attack from
https://brainly.com/question/76529
#SPJ1
In binary, what would be the largest number 2^9 would allow?
Answer:
511
Explanation:
(2 ^ 9) - 1 = 511
We first have 2 ^ 9 which is 512, but we subtract 1 becuase while it can hold 512 values, it starts at 0.
What is the graphic artist trying to achieve in this illustration, using contrast in color?
Answer:
Image result for What is the graphic artist trying to achieve in this illustration, using contrast in color?
Having a contrast of size adds visual interest in the composition, and will help you establish the key elements in your layout so you can be sure the viewer is focusing on the right area. Contrast of size is not applicable to just text; it can also be the images in the design.
Explanation:
Answer: the answer is emphasis
Explanation:
Explain why it is important that the device registration is the last thing that is done in the initialization routine of a device driver. Likewise, explain why un-registering a device must happen first in the exit routine of a device driver.
The reason why device registration is the last thing done is that if any errors happens at the time you register device, you have to undo the registration activities and as such, it is often done last.
What is role of a device driver?The device driver is known to be the device that gives the other part of the operating system the needed software interface or the device class.
The reason why un-registering a device must happen first in the exit routine of a device driver is because if there is an issue, one has to settle it first before registration as one does not want error.
Conclusively, If any kind of errors is seen when a person wants to register the device, the person must undo any kind of registration that has been performed before that error occurs.
Learn more about device registration from
https://brainly.com/question/16010611
Cristo has been working with a free, drag and drop style editor for a while and wants
to move beyond this to a more sophisticated style of editing software. What kind of
expanded options or features can Cristo MOST LIKELY expect with his upgraded
editing software?
A. versatility of movement, color-correction tools, tutorials
B. automatic image improvement, oil painting effect, watermark removal
C. unintentional noise, intellectual property removal. licensing
D. exclusive rights options, optical aberrations, pixilations
Answer:
c. unintentional noise, intellecetual property removal. licensing
Explanation:
the noise is too loud, its surrounding you, escape, ESCAPE HELP YOIURSELF HELP ME
لول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجليلول تصيد رجلي
The expanded options or features can Cristo MOST LIKELY expect with his upgraded editing software is C. unintentional noise, and intellectual property removal. licensing.
What are The maximum not unusual place kind of highbrow?The belongings dispute is that of infringement. This is wherein highbrow belongings is used or appropriated with out the owner's permission via way of means of another. Infringement can observe to many classes of highbrow belongings.
Some of the maximum not unusual place violations are: Infringement of patent, trademark or copyright rights. Counterfeiting of copyrights or trademarks. Misappropriating exchange secrets.
Read more about the versatility :
https://brainly.com/question/2193795
#SPJ2
VGV Corp. releases a print ad in which readers are provided a phone number. Readers can call this number to ask queries related to the product. This type of a posttest is known as a(n) ______.
Hence, based on the actions of VGV Corp, we can see that this is a call to action.
What is a Call to Action?This has to do with the marketing strategy that is used to get an instant response from customers and get them to buy its products.
Hence, the action of providing a number for easy reach to make queries that are related to the product by VGV Corporation is simply known as a call to action.
Read more about call to action here:
https://brainly.com/question/23142539
Areas covered in digital governance include data architecture, data ________, data modeling, data warehousing, and data security.
Answer:
quality
Explanation:
Areas covered in digital governance include data architecture, data ________, data modeling, data warehousing, and data security.
quality
Write a function that can find the largest item in the array and returns it. The function takes the array as an input. From the main function, send initial address, type and length of the array to the function. You can use registers to send the data to the function. Also return the largest item in the array using EAX register. You can use the following array for this problem. Array DWORD 10, 34, 2, 56, 67, -1, 9, 45, 0, 11
Answer:
var newArray = array.OrderByDescending(x => x).Take(n).ToArray();
Explanation:
Write the find_index_of_largest() function (which returns the index of the largest item in an array). Eg: a = [1 3 5 2 8 0]; largest = find_index_of_largest ( a ); largest = 5; Question: Write the
How to connect two monitors to a laptop with one hdmi port?.
Answer:
If you have a USB or USB-C port in your laptop, I would suggest getting a USB/USB-C to hdmi adapter to plug into your laptop and use it with one of your monitors.
Explanation:
Although fun and entertainment are the primary functions of video games, they have other uses, as well. An
accidental experiment in pandemics was performed in 2005 in the virtual reality game, World of Warcraft, and
The University of Washington released an interactive game, Foldit, that allowed users to solve problems or find
solutions to various puzzles. Choose one of these scenarios and explain how the situation helped scientists
learn. What is another problem that you think could be addressed by using video games?
The problem that you think could be addressed by using video games is financial management skills.
What problem does gaming handles?A lot of Scientific research have seen that video games improve people's creativity and also their skill in terms of problem-solving skills.
Note that it can also help to improve financial management skills and also make people to have stable jobs and good source of income.
Learn more about video games from
https://brainly.com/question/8870121
what is system software?
Answer:
It's a computer software designed to operate and control the operations of the hardware components and provide a platform for running apps
You have a small network that has only two route possibilities. You want to control the flow of traffic to a specific route. Which routing approach would be the BEST choice
The routing approach would be the best choice for the above scenario is Static routing.
What is Static routing?This is known to be the best or ideal routing that is good in small networks where only a one or few routes can be seen or in networks where full control of routing is needed.
Note that static routing has some demerit that can make it difficult and hard to handle in large environments and as such it can only be useful in small areas.
Learn more about network from
https://brainly.com/question/12110831
Define digital technology?
Answer:
electronic tools, systems, devices and resources that generate, store or process data.
Explanation:
Explain what a Magnetic Resonance Imaging machine does.
If your answer is correct I will give a brainlist thingy.
Answer:
Magnetic Resonance Imaging, better known as MRI, is a machine mostly used in the medical field. It performs many tasks such as forming pictures of the anatomy of the human body and processes of the body. MRI can also scan a person's brain to figure out if there is a tumor or not.
☆anvipatel77☆
•Expert•
Brainly Community Contributor
If a Windows system crashes or has a corrupted OS, it can be restored to its previous state from a previously created _______________.
Best definition of an input device
Answer:
physical piece of hardware that connects to a primary device, such as a computer, in order to provide user input.
Explanation:
explain four features of presentation packages
Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is pressed, it can cause a variety of different outcomes, such as opening a door or changing the volume. But you don't need to know what the button is going to do in order to operate it-you just push it. Which concept is he most likely talking about?
a) polymorphism
b) inheritance
c) encapsulation
d) overriding
Answer:
Polymorphism
Explanation:
You can have a basic button class that gets inherited by other classes.
class Button {
function pushButton(){}
}
class ElevatorButton extends Button{};
class BigRedButton extends Button{};
With these new classes, they inherit from the basic button class. They can decide what happens when the method pushButton() is called.
You don't need to worry about what pushButton() actually does, you can just call it if the object is of the type "Button" and you can expect it to work.
you want to search for a certain value and then return the index of that
value, which section of MakeCode Arcade's toolbox would you use?
A. Modify
O B. Operations
C. Read
D. Create
The section of MakeCode Arcade's toolbox would you use is to Modify.
What is Microsoft MakeCode?The Microsoft MakeCode is known to be a type of an app or tool that is free and it is also an open source platform.
It is often used in forms engaging computer science learning experiences that aids a progression way or method into real-world programming.
Learn more about MakeCode from
https://brainly.com/question/26995556
Answer: Read
Explanation:
took the test