Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Answers

Answer 1
its know as a virus (a program created to spread and maliciously harm computers)

Related Questions

What are the two basic windows 8 settings for network security?

Answers

The two basic windows 8 setting for network security are Public and private network. The private network settings mean that you can link home group and make remote desktop connections. Public network settings entail the greatest privacy. You should make sure file or device sharing is disabled for having data copy.

 

 

When you view the file list on the
c.drive, you will see the ____ folder?

Answers

When you view the file list on the
c.drive, you will see the users folder?

Whenever a program or command is executed, the kernel assigns an identification number called a(n) ____ to the process?

Answers

PID, process identification.

Whenever a program or command is executed, the kernel assigns an identification number called a process idenitification number to the process.

What is a  process idenitification number?

A process idenitification number is a unique number that is assigned to a program upon execution. The program identification number is an identifier that separatest he program from others.  

Unix, macOS and Windows are some operating programs that assign the number to command  and programs after execution.

Learn more about the process idenitification number  here:

https://brainly.com/question/31496282

#SPJ2

In object-oriented terms, a(n) ____________________ defines an object’s behavior

Answers

Do you have any answer choices?

A ____ contains a reference to a specific web page that you can click to open that web page.

Answers

I believe your answer would be LINK a link contains a reference to a specific web page that you can click to open that web page.

Ip addresses and their corresponding domain names are used to identify computers available through the internet.

Answers

domain names would be the answer

A service like that provided by google, which searches the internet but provides little original content,

Answers

The answer is AGGREGATOR which is a website that provides search an aggregation services but creates little or no original content. On the internet, news organizations that employ reporters and create articles are known as content providers, because they provide original content. Unfortunately for the content providers, they collect only a small share of the total revenue from online advertising. Most ad revenue goes to aggregators, such as google that provide search and aggregation services but generate little or no original content. 

Secondary storage devices that are input and output devices include all except:

Answers

Output devices. You're welcome

An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called

Answers

It's called an RSS (Really Simple Syndication).
A Web service that aggregates selected information from various Web resources, including newsgroups, blogs, forums, and other news and information services and delivers it to a user ' s desktop in a convenient, easy-to-use format.

Software on the nas handles features such as data storage, file access, and file and storage management. true or false

Answers

True! pretty sure :D

Answer:

True

Explanation:

A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3 is 10 K . If the supplied voltage is 100 VDC, what is the total power in the circuit?
         
A. 2.18 W
   
B. 8.18 W
   
C. 7.67 W
   
D. 4.24 W

Answers

The value of total resistance of resistors connected in parallel is calculated through the equation,
      
                      R = 1 / (1/R1 + 1/R2 + 1/R3 + 1/Rn)

Substituting the known values,

                     R = 1 / (1/2 + 1/6 + 1/10)
                           R = 30/23 ohms

The formula for power with the use of resistance and voltage is,

                         P = V² / R

Substituting,
                         P = (100 V)² / (30/23 ohms)
                         P = 7.67 kW

Thus, the answer to this item is letter C.  

All java classes must contain a main method which is the first method executed when the java class is called upon.

Answers

This is false. Not all java classes need a main method. You can create you own class below the class with the main method and put your own user-created methods into it. Classes without a main method can be in its own separate class even.

The set of computing hardware, network hardware and system software used by an organization is called the _________.â

Answers

The set of computing hardware, network hardware and system software used by an organization is called the technology architecture. It is a description of the interaction and the structure of the services, logical and the physical components of technology. It is important in businesses today as it organizes all the system in the business.

________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.

Answers

E-text is digital textual information that can be stored, manipulated, and transmitted by electronic devices. The term "e-text" stands for electronic text and it is used for any digital document written, read, transmitted or manipulated by electronic devices, such as smart phones, PCs, tablets,...The origins of the e-text are in the beginning of the Internet.

Which option describes wearable technology?
A) The incorporation of technology into objects we use regularly
B) Rugged technology that can withstand the elements without much damage
C) Computing systems that derive energy from the user's biological processes
D) Mobile technology that is extremely portable
E) Extremely small and powerful computing systems

Answers

My opinion is the answers A and D. I would choose A if you can only choose one, though.

The incorporation of technology into objects we use regularly  best describes wearable technology; A) The incorporation of technology into objects we use regularly.

What is wearable technology?

The Wearable technology is smart electronic devices that can be fused into apparel or worn on the body as inserts or frill. Additionally a classification of innovative gadgets that can be worn by a shopper and frequently incorporate the following data identified with wellbeing and wellness.  

The Other wearable tech contraptions incorporate gadgets that have little movement sensors to take photographs and adjust with your cell phones.

This innovation offers the chance to build the wellbeing of shoppers, with numerous guardians preferring having the option to protect their children.

The incorporation of technology into objects we use regularly  best describes wearable technology; A) The incorporation of technology into objects we use regularly.

Learn more about the wearable technology;

https://brainly.com/question/14326897

#SPJ2

Many programming languages require a ____ to create executable files.

Answers

Most languages require a compiler. This is because machine code consists of only 0s and 1s, which is executable. All other languages have to be translated into machine language by a compiler.

3 uses for auto formatting

Answers

Auto formatting is a computer software feature that automatically change the appearance of texts. Uses of auto formatting include the following:
it can be used to quickly apply or change automatic formatting.
It can be used to give a professional look to a document with minimal efforts.
the internet and network hyperlink option can be used to format email addresses and URL as clickable hyper link fields. 
The border line option can be used to apply paragraphs border styles to one's documents.
The table option can be used to create a table. 

A ____ stores images, audio clips, and/or video clips.

Answers

storage device i.e harddisk, memory card etc.

Why are digital calendars considered to be a convenient way to maintain a study schedule?

A. They are always backed up on the cloud.
B. They can be used anywhere.
C. They update changes automatically.
D. They can never be lost or destroyed.

Answers

Answer:

They can be used anywhere

Explanation:

Being able to access it anywhere is really convenient. Hope this helped and have a great day! :)

We see that digital calendars are seen convenient to maintain a study schedule because "They can be used anywhere." Thus, option B is correct.

What is digital calendar?

Digital calendar refers to a calendar that makes use of electronic screen to display and show one's events and updates. Digital calendars are actually a convenient way to maintain study schedules because they can be used anywhere.

The reason behind this, sterns from the fact that digital calendars are artificial intelligence devices with important features such as a reminders, data capture and memo that stores the particular command and responds it as at when due. Digital calendars are considered to be a convenient way to maintain a study schedule.

Therefore, We see that digital calendars are seen convenient to maintain a study schedule because "They can be used anywhere." Thus, option B is correct.

Learn more about digital calendar on:

brainly.com/question/10683140

#SPJ3

List three types of cardinalities for relationships within a relational database.

Answers

This is about identifiers in a record referring to other records.
You can have many to one, one to one, many to many.

E.g., if you have two tables, Authors and Books, then a book record could have a reference to an author record. Since an author can write many books, this would be a many-to-one relationship.


When a url ends in a folder name instead of a file name, the server automatically looks for a file called:?

Answers

When a URL ends in a folder name instead of a file name, the server automatically looks for a file called: index.html

One unique anatomical feature of cardiac muscle, which isn't seen in skeletal or smooth muscle, is

Answers

The answer to this question is the Intercalated disks.

Intercalated discs are also known as the gap functions. Intercalated discs are microscopic details of the cardiac muscles. Intercalated discs functions as a connector in the two adjacent cardiac cells. This also contains membrane junctions which are the fascia adherens, gap junctions, and macual adherens.    

The disk drive is a secondary storage device that stores data by ________ encoding it onto circular disks.

Answers

Physically encoding it.

The part of the operating system that provides the basic building block to support higher level operating system function is called ____________

Answers

I believe this part of the OS is called the Kernel. Correct me if I'm wrong.

The alto computer, built by ________, was the first to use a graphical user interface (gui).

Answers

The Alto computer was first built by Xerox.

Voip service is interrupted during a power failure true or false

Answers

VoIP stands for Voice over Internet Protocol. VoIP is a digital telephone service in which calls are sent and received over the Internet. High speed Internet connection a VoIP phone service provider are needed in order to have this type of service.  
It is true, that VoIP service is interrupted during a power failure. You should have backup power supplies to support your VoIP network when the power is out in order to have uninterrupted service. 

A video encoder is also commonly referred to as a ____________. a video encoder is also commonly referred to as a

Answers

A video encoder is also commonly referred to as a video codec. It is a circuit or a software that decompresses or compresses a video. The compressed video is formatted so as to conforms to a specific standard video compression specification. Examples are H.265/MPEG-H HEVC codecs, H.263/MPEG-4 Part 2 codecs and Microsoft codecs.

A class named clock has two instance variables : hours (type int ) and isticking (type boolean ). write a constructor that takes a reference to an existing clock object as a parameter and copies that object 's instance variables to the object being created. your task: write a clock constructor that makes this possible. just write this constructor -- don't write the whole class or any code outside of the class !

Answers

I guess you need it written in Java. So if you need only constructor, then here it is:
public Clock(Clock clock1) {
          this.hours = clock1.hours;
          this.isTicking = clock1.isTicking;
}

This code is 100% correct

On a hard disk each track is divided into invisible wedge-shaped sections called _______

Answers

On a hard disk each track is divided into invisible wedge-shaped sections called sectors. The sector is a subdivision of a track on the hard disk that can be 512, 2048, or 4096 bytes large. A sector is also referred as block. It is usually made up of three parts: the sector header, the error-correcting code (ECC), and the area that actually stores the data.

Some bicyclists create unsafe situations by riding __________ for the traffic environment and weather conditions.

Answers

Some bicyclists create unsafe situations by riding AT EXCESSIVE SPEED for the traffic environment and weather condition. Bicycles do not have speedometer but it is still against the law to drive at excessive speed. Driving at excessive speed makes it difficult for one to quickly adjust in order to avoid accident. 
Other Questions
The meaning of "apace" as it is used in the opening paragraph of the passage found in the article of "the cost of children" by Ruth Mace If runners in a long distance race were to run straight from the starting line to the finish line they would run 13 kilometers. However, the road they run makes them travel longer than that. They must run 5 kilometers south and then head west "x" kilometers for the remainder of the race. How far do the runners travel? According to current law, for works created after 1976, what are the copyright durations for a creator and for a corporation? two brothers inherit different sets of alleles from their parents. what effect will they have? Decelerating to avoid a potential or immediate hazard would be considered what step in the ipde process? A(n) ________ is a description of how the researchers will measure the variables of interest. Adam borrows $4,500 at 12 percent annually compounded interest to be repaid in four equal annual installments. the actual end-of-year payment is ________. Please help ASAP!Which of the following is true about flappers?A) They believed in traditional values.B) They drank, smoked, and wore short skirts.C) Most women in the 1920s were considered flappers.D) They believed young girls should focus on marriage and motherhood. Explain the second principle of training, and the balance one needs to find. 4 students equally share 3/4 of a pizza. How much of the pizza does each student get? In an upcoming race, the top 3 finishers will be recognized with the same award. Ryan is one of 12 people entered in the race.If all racers are equal in skill, what is the probability that Ryan will be one of the top 3 racers? Find two positive numbers a and b (withab) whose sum is 88 and whose product is maximized. One of the alliances formed because of rivalries over colonies and trade was the triple alliance, which consisted of __________ Chaz and Michael used to be best friends but had grown apart when they started high school. Chaz, a good-looking baseball player, was accepted into the popular group, while Michael, a shy "bookworm," kept quiet and tried not to draw attention to himself. After a party, Chaz gets into trouble and is abandoned by his new friends. Michael agrees to help him, even though they haven't spoken in a long time.Which sentence best states the complex theme of the passage? A.Popular people are not very good friends. B.Chaz learns a lesson about friendship. C.Friendship D.True friends will always be there for you. Select the inequality that corresponds to the given graph. graph of an inequality with a dashed line through the points negative 3 comma 0 and 0 comma 4 and shading below the lineA. 4x-3y>-12B. x+4y>4C. 4x-2y-16 Find the work done by a force f =1.8i^+2.2j^n as it acts on an object moving from the origin to the point r =56i^+31j^m. You are getting a line-up ready for a school kickball game. you have 55 girls and 55 boys. the rules state each child must kick the same number of times and alternate girl-boy or boy-girl. how many ways can a line-up be made for one round of kicking A factory employs 3 full-time workers and 6 part-time workers; the amount earned by each is: $36,000 for the production supervisor; $27,000 for the machine operator; $21,000 for the general assistant; a total of $50,000 for part-time staff. How much was the wage bill for the 3 full-time staff? Mood swings are psychological/emotional signs of addiction. a. True b. False As a country becomes healthier, what is most likely to happen regarding childhood mortality? Steam Workshop Downloader