Explanation:
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
MARK AS BRAINLIST IF IT IS USEFUL
EXERCISE
Fill in the blanks for the following sentences. (Note: This exercise will not be graded and does
not have to be handed in.)
1. The physical parts or components of a computer 2system is called
2. The provides access to the Internet, may also be internal.
3. The contains the computer's "brain," the central processing unit (CPU).
4. Software that instructs the computer how to run applications and controls the display/keyboard
is know as the
5. A/An is a series of instructions or commands that a computer follows; used to create
software
1. Hardware
2.lan
3. cu
4.utility software
5.A
why is default value use in ms access table ?
Answer:
The DefaultValue property specifies text or an expression that's automatically entered in a control or field when a new record is created. For example, if you set the DefaultValue property for a text box control to =Now(), the control displays the current date and time.
how is computer in each generation distinguished from each other
Answer:
By the electrical current flowing through the processing mechanismsWhy do scientist believe the storm is so severe.
Answer:
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies.
Explanation:
[tex]\sf{}[/tex]
♛┈⛧┈┈•༶♛┈⛧┈┈•༶
xd ... ;)
Where can you get information on receiving financial help?
Answer:
You can find financial help on gogle
Direction: Enci
1. UNIVAC is
Answer:
UNIVAC is Universal Automatic Calculator.
It was inveted by Presper J. Eckert and John W. Mauchly, in 90' s
Explanation:
[tex].[/tex]
question of Computer science
Answer:
a)None
b)All
this is ur answer from my opinion
when data is collected and turned into information, it is called
Answer:
its called data processing
Explanation:
...
Explanation:
When data is collected and turned into information, it is called program .
binary divide 1101011 by 111
is this computer subject
please mark this answer as brainlist
Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.
Answer:
number c is the correct answer
Difference between pointer and cursor
Answer:
The difference between Cursor and Pointer. When used as nouns, cursor means a part of any of several scientific instruments that moves back and forth to indicate a position, whereas pointer means anything that points or is used for pointing. Cursor is also verb with the meaning: to navigate by means of the cursor keys.
Explanation:
Hope it helps you
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario
Answer: I gave 6 you can choose from.
Integrity
Scalability
Quality of Service
Fault of Tolerance
Powerline Networking
Security
It is true or false Nowadays computer games are mostly available on external hard disk.
Answer:
false
Explanation:
because we're playing it on a mobile phone and a laptop than the hard disk. the hard disk is so old to use it nowadays.
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator
Answer:
Explanation:
https://examict.com/refer-to-the-exhibit-baseline-documentation-for-a-small-company-had-ping-round-trip-time-statistics-of-36-97-132-between-hosts-h1-and-h3-today-the-network-administrator-checked-connectivity-by-pingi/
what is the role of computer in education sector?
Explanation:
Computer can improve the student learning and basic skill area. Computers not only improve the learning process, it also increases retention of the students. Effective and adequate teacher learning is an integral element of the successful learning program.
What are the two most common kinds of hard drives?
open source and proprietary
O terabyte and gigabyte
O RAM and ROM
O magnetic hard disk drive and solid state drive
A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements is called: A. participatory design. B. joint application design (JAD). C. prototyping. D. whiteboarding. E. rapid application development (RAD).
Answer:
B
Explanation:
joint application design (JAD)
compare computer memory sizes during the 5 computer generation periods
Answer:
The term "fifth generation" was intended to convey the system as being advanced. ... Whereas previous computer generations had focused on increasing the number of logic elements in a single CPU, the fifth generation, it was widely believed at the time, would instead turn to massive numbers of CPUs for added performance.
Explanation:
What is the result when you run the following line of code after a prompt? >>> print "Good job"
Answer:
You will get line "Good job" itself
Into how many types is qbasic statement classified?
Answer:
two types
Explanation:
1)numeric variable
2)string variable
What is the role of UPS in Computer security?
4 marks answer
Answer:
UPS is used to protect hardware like computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, serious business disruption or data loss
class 10 computer unit 1 all excersise
what are some of the opportunities that the stem program offers?
Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.
Information obtained via: https://www.bestcolleges.com/careers/stem/
How many units are considered a full time student at a community college in California?
Answer:
12
Explanation:
According to Saddleback college located in California;
12 units are considered full-time student status.
You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.
¿Cuáles aspectos serían los que más incidirían para que no se pudiera cumplir con el principio de imparcialidad en una auditoría interna?
You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem
1. Fill in the blanks:
a. OSS is the ____ software.
b. Pendrive is also known as _____ drive.
c. Computer is derived from ____ word.
d. Physical part of computer is called ____
e. _____ is the collection of program.
please help me tommorow is my exam
Answer:
a) computer software b) flash drivec) Latin "putare" d) Hardwaree) softwarehope it's helpful ✌
Answer:
a.Computer software.
b.flash drive.
c.Latin "putare".
d.Hardware.
e.Software.
What do earthquakes and tsunamis have in common?
Answer: They modify the earth's surface
Explanation:
It was the correct answer on QC. Hope this helps
Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.
What are tectonic plates?Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.
The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.
Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.
Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."
When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.
Thus, this is the similarity between earthquake and tsunami.
For more details regarding tectonic plates, visit:
https://brainly.com/question/16944828
#SPJ2
Released in 1976, the Apple I was Apple Computer's first product.
O True
O False
life without internet points
A web ______ makes a web page available to a browser that requests the page to view.
A. specializer
B. breaker
C. candidate
D. server
Answer:
D. server
Explanation: