Answer:
A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
Answer:
Computer virus :
In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
True or False, In adversarial searching, agents using the MiniMax algorithm always select the state that has the highest guaranteed net value.
Answer:
True
Explanation:
The MiniMax algorithm computes the MiniMax decision from the current state. The MiniMax algorithm always is especially known for its usefulness in calculating the best move in two-player games where all the information is available
Most shop accidents are caused by?
Answer:Most shop accidents are caused by÷
liftingpoor light trips and fallsstressdangerous materialsact of shop violencedehydrationextreme tirednessin media literacy,
how does media influence public? and the press
⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc
what is mean by computers
what are the functions of an input device
Answer:
This article does not cite any sources.
In computing, an input device is a piece of equipment used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones.
Select the best answer for the question
17. Which of the following is a design theory that recognizes that many problems are similar to problems that have already been solved?
O A. C-K Theory
O BASE
OC. TRIZ
OD. General Design Theory
your answer is C my guy
Write short note on:
i) keyboard
ii) Web camera
Software engineer is responsible for defining the level of maturity the software program must perfom at in order to declare software test
a. True
b. False
Answer:
true
Explanation:
Hope, it helps to you
_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
The right answer will be "The Internet of Things (IoT)".
Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.
Learn more about IoT here:
https://brainly.com/question/19995128
45. _____ is used to create an object. a. Class b. constructor c. User-defined functions d. In-built functions
Answer: B
Explanation: A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. ... Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.
In computer programming, a resource which is used to create an object is called: B. constructor.
What is a constructor?A constructor can be defined as a special method that is designed and developed to enable programmers create and initialize objects in Java programming.
This ultimately implies that, a constructor is a resource which can used to create an object in computer programming.
Read more on constructor here: https://brainly.com/question/26914047
What is the TSA motto
Answer:
the answer is "Learning to lead in a technical word".
Explanation:
8. Which of the following is
most likely to contain a
computer virus?
1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM
Answer:
4. A floppy Disk
Explanation:
This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected
[tex].[/tex]
2. Which of these Is NOT part of the definition of Electricity?
A. Ability to do work
B. Closed Circuit
C. Power Supply
D. Movement of electrons
Answer:
B. closed circuit
Explanation:
please follow me
hope it helps you
Topic:
Recursion. Use recursion to display the pattern given above. No loops allowed.
See the picture for the pattern
Answer:
const SIZE=8
function print(n, s) {
if (n > 0) {
process.stdout.write(s);
print(n-1, s);
}
}
function main(n=1) {
if (n<=SIZE) {
print(SIZE-n, " ");
print(n, "* ");
process.stdout.write("\n");
main(n+1);
}
}
main();
Explanation:
Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.
Write a short note on
i) Printer
i)Speaker
( no problem if u don't know but don't just spam :(.....)
A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and cost.
Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits per track is determined by the circumference of the innermost track, which you can assume is also the circumference of the hole. This, if you make the hole in the center of the disk larger, the number of bits per track increases, but the total number of tracks decreases. If you let r denote the radius of the platter, and x · r the radius of the hole, what value of x maximizes the capacity of the disk?
Answer:
suppose i was i would tell them i dont know and walk away
Explanation:
in thoery this is correct
you said suppose so i answerd
there is no use in reporting or getting this taken down
nether is it right
im not stealing points
Because in thoery its an answer
THIS IS MY PROTEST
Write a algorithm to calculate the sum of digits in a given three digit number
[tex]{\huge{\pink{↬}}} \: \: {\huge{\underline{\boxed{\bf{\pink{Answer}}}}}}[/tex]
Sum of digits algorithm
Step 1: Get number by user.
Step 2: Get the modulus/remainder of the number.
Step 3: sum the remainder of the number.
Step 4: Divide the number by 10.
Step 5: Repeat the step 2 while number is greater than 0.
Run the program and observe the output to be: 55 4 250 19. Modify the numsInsert function to insert each item in sorted order. The new program should output: 4 19 55 250.
#include
#include
using namespace std;
void numsInsert(vector& numsList, int newNum) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
if (newNum < numsList.at(i)) {
// FIXME: insert newNum at element i
break; // Exits the for loop
}
}
// FIXME: change so executes if higher number NOT found
// Change "true" to "i == ??" (determine what ?? should be)
if (true) { // No higher number was found, so append to end
numsList.push_back(newNum);
}
}
void numsPrint(const vector& numsList) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
cout << " " << numsList.at(i) << endl;
}
}
int main() {
vector numsList;
numsInsert(numsList, 55);
numsInsert(numsList, 4);
numsInsert(numsList, 250);
numsInsert(numsList, 19);
numsPrint (numsList);
return 0;
}
Answer:
#include <iostream>
#include <vector>
using namespace std;
void numsInsert(vector<int>& numsList, int newNum) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
if (newNum < numsList.at(i)) {
// FIXME: insert newNum at element i
numsList.insert(numsList.begin() + i, newNum);
break; // Exits the for loop
}
}
// FIXME: change so executes if higher number NOT found
// Change "true" to "i == ??" (determine what ?? should be)
if (i == numsList.size()) { // No higher number was found, so append to end
numsList.push_back(newNum);
}
}
void numsPrint(const vector<int>& numsList) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
cout << " " << numsList.at(i) << endl;
}
}
int main() {
vector<int> numsList;
numsInsert(numsList, 55);
numsInsert(numsList, 4);
numsInsert(numsList, 250);
numsInsert(numsList, 19);
numsPrint(numsList);
return 0;
}
Explanation:
Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government.
a. True
b. False
When it comes to memory, why is it important to have enough storage space on a hard drive when using many RAM intensive programs?
Answer:
Memory and storage are important concepts to master in Information Technology. ... This type of memory is volatile which means that the actual data disappears when the computer loses power. Because memory needs to be much faster than storage, it is rather more expensive than storage per GB.
Explanation:
50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4
Answer:
The cell address of 4th row and 4th column is
4D/D4
When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?
a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used
How was Television used when originally invented? How is television used today?
Explanation:
.......................
Answer:
Than:
Baird's early mechanical television had 30 holes and rotated 12.5 times per second. There was a lens in front of the disk to focus light onto the subject. When light hit the subject, that light would be reflected into a photoelectric cell, which then converted this light energy to electrical impulses.
Now :
Television is an inescapable part of modern culture. We depend on TV for entertainment, news, education, culture, weather, sports—and even music, since the advent of music videos. ... News, current events and historical programming can help make young people more aware of other cultures and people.
Comparison
Cloud computing and parallel processors
Anwser is 2/3
Explanation:
What method is known as a class's constructor, because it is run automatically when a user instantiates the class
A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. ... Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.
What software programming language was first
used to power the Internet (.com, .net)?
Answer:
the answer should be .com, because the very first domain was Symbolics.com
Explanation:
hope this helps, have a great day.
Why LinkedIn doesn’t like automation tools?
Answer:
LinkedIn has clearly mentioned that using LinkedIn automation is against their TOS. They block an account if they suspect any automation activity.
It’s because they want to keep the platform transparent and free of spam. Many users have already called it the worsts social media platform because of spamming.
On the other hand, large companies and brands are endorsing these tools. Many users have got their accounts blocked while many are using LinkedIn automation to grow their business opportunities.
List the resulting array after each call of the merge method. Indicate the number of character-to-character comparisons made for each call to merge (line 22 of the merge method at the end of the assignment). Sort the following array of characters into alphabetical order: C Q S A X B T.
01 public static void mergesort (char[] a, int i, int r){
02
03 if (1 >= r) {
04 return;
05 }
06 int middle = (1+r)/2;
07 mergesort(a, l, middle);
08 mergesort(a, middle+1, r);
09 merge(a, l, middle, r);
10 }
11
12 public static void merge (char[] a, int i, int m, int r){
13
14 //copy lower half of the array into b
15 char [] b = new char[m-1+1];
16 for (int i = 0; i <= m-1; i++ ) {
17 b[i] = a (1+i);
18 }
19
20 int i = 0, j m+1, k = 1;
21 while (i <= m-1 && j <= r ) {
22 if (a[j] < b[i]) {
23 a[j];
24 k += 1;
25 j += 1;
26 } else {
27 a[k] b[i];
28 k += 1;
29 i += 1;
30 }
31 }
32 while (i <= m-1) {
33 a[k] b[i];
34 k += 1;
35 i += 1;
36 }
37 while ( j <= r ) {
38 a[k] a[j];
39 k += 1;
40 j += 1;
41 }
42 }
Answer:
40j
Explanation:
the no. divided by one is that no.
What are the things you needed to create a bootable USB Windows Installera
Answer:
RUFUS
Explanation:
Try installing rufus software and burn the ISO file on your USB by choosing appropriate partition scheme MBR or GBT. Usually MBR works for all computers but GPT is for new systems with latest technology.
software.
Q4..
Microsoft word is an example of
(A) System
(1) word processor
(°) Presentation software
(P) Spreadsheet
Ms Word is an example of a word processor.
_____________ is driving a complete reanalysis of what information is collected and how it is presented, navigated, and used internally.