Let Dog be a subclass of Animal, and suppose Animal has a method called speak() that is overridden in the Dog class. Consider the following code. [2 points] Animal spot = new Dog();
spot. speak(); Which of the following is true? a) This code will result in a compile-time error. b) This code will result in a run-time error. c) The speak method defined in the Animal class will be called. d) The speak method defined in the Dog class will be called. e) The speak method will not be called at all.

Answers

Answer 1

Answer:

d) The speak method defined in the Dog class will be called.

Explanation:

In this code, a new instance of the Dog class is created and assigned to a variable of type Animal. When the method speak() is called on this instance using the variable spot, the overridden version of speak() in the Dog class will be called, since method calls are determined at runtime based on the actual object type, not the variable type. Therefore, option d) is the correct answer.


Related Questions

The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer’s cost. Design an algorithm that prompts the user to input the list price of the car and print the least amount that the dealer would accept for the car. C++

Answers

Here is an algorithm in C++ that prompts the user to input the list price of the car and prints the least amount that the dealer would accept for the car:

#include <iostream>

using namespace std;

int main() {

   double list_price, dealer_cost, min_accepted_price;

   const double DEALER_COST_PERCENTAGE = 0.85;

   const double MIN_ACCEPTED_PRICE_OVER_COST = 500;

   cout << "Enter the list price of the car: ";

   cin >> list_price;

   dealer_cost = list_price * DEALER_COST_PERCENTAGE;

   min_accepted_price = dealer_cost + MIN_ACCEPTED_PRICE_OVER_COST;

   cout << "The least amount the dealer would accept for the car is: $" << min_accepted_price << endl;

   return 0;

}

The algorithm starts by including the library iostream and declaring the namespaces. Then it declares the variables that will be used in the program (list_price, dealer_cost, min_accepted_price) and the constants that will be used (DEALER_COST_PERCENTAGE and MIN_ACCEPTED_PRICE_OVER_COST). Then it prompts the user to enter the list price of the car. Next, it calculates the dealer's cost by multiplying the list price by the dealer cost percentage and the minimum amount the dealer would accept by adding the dealer's cost to the minimum accepted price over cost. Finally, it prints the least amount the dealer would accept for the car.

Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems: • A system to control anti-lock braking in a car • A virtual reality system to support software maintenance • A university accounting system that replaces an existing system • An interactive travel planning system that helps users plan journeys with the lowest environmental impac

Answers

There are different kinds of systems. the answers to the questions is given below;

Anti-lock braking system:  Is simply known as a safety-critical system that helps drivers to have a lot of stability and hinder the spinning of car out of control. This requires a lot of implementation. The rights generic software process model to use in the control of the anti-lock braking in a car is Waterfall model.

  Virtual reality system: This is regarded as the use of computer modeling and simulation that helps an individual to to be able to communicate with an artificial three-dimensional (3-D) visual etc.  the  most appropriate generic software process model to use is the use of Incremental development along with some UI prototyping. One can also use an agile process.

 University accounting system:  This is a system is known to have different kinds of requirements as it differs. The right appropriate generic software process model too use is the reuse-based approach.

  Interactive travel planning system:  This is known to be a kind of System that has a lot of complex user interface. The most appropriate generic software process model is the use of an incremental development approach because with this, the system needs will be altered as real user experience gain more with the system.

Learn more about software development from

https://brainly.com/question/25310031

what is an operating system​

Answers

An operating system (OS) is a system software program that operates, manages, and controls the computer's hardware and software resources. The OS establishes a connection between the computer hardware, application programs, and the user.

Its primary function is to provide a user interface and an environment in which users can interact with their machines. The OS also manages the storage, memory, and processing power of the computer, and provides services like security and network connectivity.

Examples of popular operating systems are Windows, macOS, Linux, iOS, and Android. These OSs have different user interfaces and feature sets, but they all perform the same essential functions. The OS is a fundamental component of a computer system and is responsible for ensuring the computer hardware operates efficiently and correctly.

The OS performs several key tasks, including:

1. Memory management: Allocating memory to applications as they run, and releasing it when the application closes.
2. Processor management: Allocating processor time to different applications and processes.
3. Device management: Controlling input/output devices such as printers, scanners, and other peripherals.
4. Security: Protecting the computer from malware, viruses, and other threats.
5. User interface: Providing a graphical user interface that enables users to interact with their machine.

For more such questions on operating system, click on:

https://brainly.com/question/22811693

#SPJ8

Hello, I've tried everything and I cannot get this code to be fair. I need help. Can someone provide guidance so I can understand how to formulate the proper code for this question so I can understand how it should be set up in Python or Python #. Thanks truly. I really appreciate a response. Enjoy your day:

2.26 LAB: Seasons
Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day.

Ex: If the input is:

April
11
the output is:

Spring
In addition, check if the string and int are valid (an actual month and day).

Ex: If the input is:

Blue
65
the output is:

Invalid
The dates for each season are:
Spring: March 20 - June 20
Summer: June 21 - September 21
Autumn: September 22 - December 20
Winter: December 21 - March 19

Answers

A program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day is given below:

The Program

input_month = input()

input_day = int(input())

months= ('January', 'February','March', 'April' , 'May' , 'June' , 'July' , 'August' , 'September' , "October" , "November" , "December")

if not(input_month in months):

  print("Invalid")

elif input_month == 'March':

   if not(1<=input_day<=31):

       print ("Invalid")

   elif input_day<=19:

       print("Winter")

   else:

      print ("Spring")

elif input_month == 'April' :

   if not(1<=input_day<=30):

       print("Invalid")

   else:

      print("Spring")

elif input_month == 'May':

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Spring")

elif input_month == 'June':

   if not(1<=input_day<=30):

       print("Invalid")

   elif input_day<=20:

       print ("Spring")

   else:

       print("Summer")

elif input_month == 'July' or 'August':

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Summer")

elif input_month == 'September':

   if not(1<=input_day<=30):

       print("Invalid")

  elif input_day<=21:

       print ("Summer")

   else:

       print ("Autumn")

elif input_month == "October":

   if not(1<=input_day<=31):

      print("Invalid")

   else:

       print("Autumn")

elif input_month == "November":

   if not(1<=input_day<=30):

       print("Invalid")

   else:

       print ("Autumn")

elif input_month == "December":

   if not(1<=input_day<=31):

       print("Invalid")

   elif input_day <=20:

       print ("Autumn")

   else:

       print ("Winter")

elif input_month == 'January':

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Winter")

elif input_month == "February":

   if not(1<=input_day<=29):

       print("Invalid")

   else:

       print ("Winter")

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What are two options for exiting a presentation

Answers

Answer:Instructions on How to Close PowerPoint Presentations:

=To close a PowerPoint presentation if you have multiple presentations open, click the “x” in the upper-right corner of the application window.

=Alternatively, click the “File” tab in the Ribbon.

=Then click the “Close” command at the left side of the Backstage view.

Explanation:

The ____ icon provides an option to insert images from an external storage device into a document.
A) Shapes
B) Image
C) SmartArt
D) Picture

Answers

the good answer is D btw im mr beast

a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules

Answers

After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those   rules.

How is this so?

In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.

The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.

Office-bearers are expected to uphold the laws and serve the interests of the people they represent.

Learn more about  democratic administration at:

https://brainly.com/question/31766921

#SPJ1

Describe how hackers maintain access in a system. What steps do they follow? What tools do they use? In your opinion, once in a system, is it easy to maintain access? Why or why not? What challenges are there to staying in the system?

Answers

The way that hackers maintain access in a system is that Hackers accomplish this by searching for every log and file that might contain information about their movements or presence.

The steps are:

Reconnaissance: This is when hacking begins.Three different kinds of scanning are involved.Gaining Access: During this stage, an attacker enters the system or network using a variety of tools or techniques. Keeping Access Open Clearing the Way:

Changing the subject: How do hackers obtain information?

One method is to use spyware, which sends data from your device to others without your knowledge or consent, to try and obtain data directly from an Internet-connected device. By tricking you into opening spam email or into "clicking" on attachments, images, and links in it, hackers may be able to infect your computer with spyware.

Note that Hackers may write programs that look for unprotected entry points into computers and network systems. By infecting a computer or system with a Trojan horse—a tool designed by hackers to steal sensitive data secretly from a victim—hackers can gain backdoor access.

Learn more about hackers from

https://brainly.com/question/23294592
#SPJ1

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage recently.

Review the data and calicut are the probability that if Cass runs into one of the financial institutions customers at random, that person has applied for a home mortgage this year.


What is the total number of customers?


How many customers applied for a home mortgage?

Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage

Answers

Answer:

Doesn't make a lot of sense. Can you be more specific.

Explanation:

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

which of the following is a common security misconfiguration an attacker might use to gain access to a website or application?

Answers

Default passwords and accounts are activated— It is a typical security mistake to use vendor-supplied defaults for system accounts and passwords, which could provide attackers access to the system without authorization.

Guest, admin, and password are a few examples of default passwords. These single default passwords, which are frequently used by suppliers, are easily discoverable online using search engines or websites that gather lists. Consequently, if left unaltered, they pose a serious security risk. Most routers typically use "admin" and "admin" as their default username and password. The router's manufacturer may change these credentials, though. Administrator Password: This password, which was established by E-CORPORATION, is needed by the system in order for the user to complete the transaction. To get the three-dot menu, open the Chrome browser and tap it. Select Autofill > Password Manager from the menu in the upper-left corner.

Learn more about Default passwords here

https://brainly.com/question/30035709

#SPJ4

For the discussed 8-bit floating point storage:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the
8-bit floating point notation.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-
bit floating point notation.
Note: You need to follow the conventions (method) given in the video lessons for the solution of this
question. Any other solution, not following the given convention, will be considered incorrect.

Answers

Using the conventions in the video lessons, the largest positive value for 8-bit floating point storage is 3.996 x 10²⁸.

A. To encode the decimal fraction -9/2 in 8-bit floating-point notation, we follow the IEEE 754 convention.

This notation consists of a sign bit, an exponent, and a mantissa. First, we convert -9/2 to binary, which is -1001/10. The sign bit will be 1 since it's negative. The next step is to represent -9/2 as a normalized binary fraction, which is -1.001 × 2^3. In this case, the exponent is 3 and the mantissa is 001.

The 8-bit floating-point notation is as follows:

Sign bit: 1 (negative)

Exponent: 3 + 127 (biased exponent) = 130 (binary: 10000010)

Mantissa: 001

Putting it all together, the 8-bit floating-point representation of -9/2 is: 1 10000010 001.

B. In 8-bit floating-point notation, the smallest negative value is determined by setting the sign bit to 1 (negative), the exponent to the minimum representable value (00000000), and the mantissa to all zeros.

Therefore, the smallest negative value in 8-bit floating-point notation is: 1 00000000 000.

C. The largest positive value in 8-bit floating-point notation is obtained by setting the sign bit to 0 (positive), the exponent to the maximum representable value (11111111), and the mantissa to all ones.

Therefore, the largest positive value in 8-bit floating-point notation is: 0 11111111 111.Please note that the given solution follows the conventions of IEEE 754 for encoding 8-bit floating-point values.

For more such questions on Floating point:

https://brainly.com/question/30453230

#SPJ8

What are some current and future trends for network technology? Check all of the boxes that apply. an increase in the number and types of devices an increase in the people who will not want to use the network an increase in the number and types of applications an increase in the use of wired phones an increase in the use of the cloud

Answers

Answer: A,C,E

Source: trust me bro

1) primary storage is stored externally (true or false)

2) one function of storage is to store program and data for later use(true or false)
correct answer only i will mark u as brainliest and i will give u 5 star rating if ur answer will correct​

Answers

Answer:

1.true

2.true

Ok will wait my rate ok❤️

A user clicks. such as option buttons and check boxes in a dialog box to provide information

Answers

Answer:

It's an input,

Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?

Answers

Answer:

Based on the scenario you have described, Sam may have violated several professional work standards, including:

1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.

2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.

3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.

4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.

Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.

Hope this helps!

Swimming coach Yuki prepared a presentation to encourage more people to swim for exercise.
Swimming provides a better workout than walking
Which three ideas can she use to support her thesis

Answers

Swimming works practically all of the body's major muscle groups, giving you a full-body workout. Swimming concurrently exercises the upper body, core, and legs, as opposed to walking, predominantly uses the lower body.

Swimming is a sort of exercise.

Cardio is a term for physical activity that benefits the heart, lungs, and circulatory system. This kind of exercise is a part of a comprehensive exercise program that includes swimming.

Is swimming a talent or a skill?

It really is a talent. We are not inferior because of these abilities. Instead, they add to our distinctiveness and can be included in the growing list of benefits that this sport provides for us. The most crucial lesson to learn from this is that swimmers are gifted individuals.

To know more about Swimming visit:-

https://brainly.com/question/17470781

#SPJ1

Which of the following is not a fundamental way to approach the creation of a new information system?
a. develop a custom application in-house
b. rely on an external vendor to build the system
c. purchase a software package and customize it
d. rely on end-users to develop it themselves
e. all of these are ways to create new information systems

Answers

Answer:

The correct answer is d. rely on end-users to develop it themselves.

All of the other options (a. develop a custom application in-house, b. rely on an external vendor to build the system, and c. purchase a software package and customize it) are common ways to approach the creation of a new information system. These approaches involve hiring professionals or purchasing software packages to design, build, and implement the system.

Option d, relying on end-users to develop the system themselves, is not a fundamental way to approach the creation of a new information system. End-users are typically not trained in the technical skills needed to design and build an information system, and they may not have the necessary expertise or resources to do so. It is generally more effective to rely on professionals or pre-existing software packages to create a new information system.

Is there an an alternative to windows's TASKKILL command?

If there is, what is the name in .exe?

Answers

Answer:

The alternative to Windows's taskkill command is called Tskill.exe.

Explanation:

Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to a2d. Write some statements that assign true to isNegative if more integer elements in entire 2-dimensional array are negative than not.

Answers

Answer:

#include <iostream>

using namespace std;

int main(){

   int rows, cols;

   bool isNegatives;

   cout<<"Rows: ";

   cin>>rows;

   cout<<"Columns: ";

   cin>>cols;

   int a2d[rows][cols];

   for(int i =0;i<rows;i++){

   for(int j =0;j<cols;j++){

       cin>>a2d[i][j];}    }

   int negatives, others = 0;

   for(int i =0;i<rows;i++){

   for(int j =0;j<cols;j++){

       if(a2d[i][j]<0){

           negatives++;}

       else{

           others++;}}    }

   if(negatives>others){

       isNegatives = true;}

   else{

       isNegatives = false;}

   cout<<isNegatives;  

   return 0;

}

Explanation:

For clarity and better understanding of the question, I answered the question from the scratch.

This line declares number of rows and columns

   int rows, cols;

This line declares the Boolean variable

   bool isNegatives;

This line prompts user for rows

   cout<<"Rows: ";

This line gets the number of rows

   cin>>rows;

This line prompts user for columns

   cout<<"Columns: ";

This line gets the number of columns

   cin>>cols;

This line declares the array

   int a2d[rows][cols];

This line gets user input for the array

   for(int i =0;i<rows;i++){

   for(int j =0;j<cols;j++){

       cin>>a2d[i][j];}    }

This line declares and initializes number of negative and others to 0

   int negatives, others = 0;

The following iteration counts the number of negatives and also count the number of non negative (i.e. others)

   for(int i =0;i<rows;i++){

   for(int j =0;j<cols;j++){

       if(a2d[i][j]<0){

           negatives++;}

       else{

           others++;}}    }

This checks of number of negatives is greater than others

   if(negatives>others){

If yes, it assigns true to isNegatives

       isNegatives = true;}

   else{

If otherwise, it assigns false to isNegatives

       isNegatives = false;}

This prints the value of isNegatives

   cout<<isNegatives;  

See attachment

Which feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports?

Add notes
Filter
Display columns by
Edit titles
Accounting method

Answers

The feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports is Edit titles.

Which feature in QBO reports allows customization of section headings?

The feature is known to be the one that is often used to alter the section titles of a report, and it is said to be the select “edit titles” .

This is often gotten from the customize ribbon that is seen at the top of a Profit and Loss or at the Balance Sheet report.

Hence, The feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports is Edit titles.

So option D is correct.

Learn more about QuickBooks from

https://brainly.com/question/24441347

#SPJ1

Explain the parts of an information system

Answers

Explanation:

An information system is essentially made up of five components hardware, software, database, network and people. These five components integrate to perform input, process, output, feedback and control. Hardware consists of input/output device, processor, operating system and media devices.

Susan has a sheet with both numerical and textual data. She has to enter the numerical data in currency format. She has to input the textual data in underlined format, and she has to wrap the text. Which formatting options will she use? Susan can use the tab to select options to format numerical data in a spreadsheet. She can use the tab to select the underlining option and the tab to wrap text in a cell or range of cells.

Answers

Answer:

Susan has a sheet with both numerical and textual data. She has to enter the numerical data in currency format. She has to input the textual data in underlined format, and she has to wrap the text. Which formatting options will she use?

Susan can use the [ Numbers ] tab to select options to format numerical data in a spreadsheet. She can use the [ Font Affects ] tab to select the underlining option and the [ Text Alignment ] tab to wrap text in a cell or range of cells.

Im not 100% sure hope this helps

a database of the virus is called____​

Answers

Answer:

I believe it is poisoning I could be wrong

Imagine you have just learned a new and more effective way to complete a task at home or work. Now, you must teach this technique to a friend or coworker, but that person is resistant to learning a new way of doing things. Explain how you would convince them to practice agility and embrace this new, more effective method.

Answers

if a person is resistant to learning a new way of doing things, one can  practice agility by

Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.

How can a person practice agility?

A person can be able to improve in their agility by carrying out some   agility tests as well as the act of incorporating any form of  specific drills into their workouts.

An example, is the act of  cutting drilling, agility ladder drills, and others,

A  training that tends to help in the area of agility are any form of exercises  such as sideways shuffles, skipping, and others.

Therefore,  if a person is resistant to learning a new way of doing things, one can  practice agility by

Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.

Learn more about agility from

https://brainly.com/question/15762653
#SPJ1

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

HELPPP
44 What text will be output by the program?
A- less than 10
B- less than 20
C- less than 30
D- 30 or more

HELPPP44 What text will be output by the program?A- less than 10B- less than 20C- less than 30 D- 30

Answers

Answer:

D. 30 or more

Explanation:

All other ones are canceled out ad the score adds 10.

The correct text for the output of the program is, ''30 or more''. So, option (D) is true.

A program is a set of instructions that a computer can run.

Programs are clear, ordered, and in a language that computers can follow.

Given that,

A program for the score is shown in the image.

Now, From the given program;

The last line will appear with the,

 console,log (''30 or more'')

Hence, The correct text for the output of the program is, ''30 or more''.

Therefore, the correct option is,

D) 30 or more

Read more about Python programs at:

brainly.com/question/26497128

#SPJ6

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already

3. What is a Trojan horse?
O A. Antivirus software for your computer
O B. Another name for a hacker
OC. A computer virus that can damage or delete files
O D. Software that eats cookies

Answers

C. A computer virus that can damage and delete files
The correct answer is: C. A computer virus that can damage or delete files. A Trojan horse is a type of malware that disguises itself as a legitimate program. Once inside the computer, it can steal data, damage files, or even take control of the computer.
Other Questions
Anton van Leeuwenhoek did all of the following EXCEPT:A) Build the first compound microscopeB) Discover bacteriaC) Help prove the theory of blood circulationD) Discover protozoans Every project has a starting date and an ending date. true false A bag contains solid color marbles and striped marbles. For his experiment of picking one marble and replacing it, Henry recorded picking a solid color marble 4 times and a striped marble 16 times. If he repeated the experiment and picked 100 marbles, predict how many would be solid and how many would be striped. which of the following is not a function of wernicke's area? select one:a.interpretation of spoken languageb.ability to see spatial imbalance among objectsc.interpretation of written wordsd.personalitye.analytical thought Which of the following limited opportunities for freedman in the south after the civil war ended?A. Radical Reconstruction B. Lincolns 10% PlanC. The Black CodesD. The Fourteenth Amendment The table of values models the quadratic function y = x2 + 7x - 9. What are the missing y-values in the table for the x-values?x -2. -1. 1. 0 1 2 y. _ _ _ _ _ _A) - 19, -15,-9, -15, -19 B) -19, -15, -9, -1,9 C) 19,15,9,1,-9 D 19, 15, 9, 1,9 Jonathan went shopping for a new pair of pants. Sales tax where he lives is 4.75%. The price of the pair of pants is $20. Find the total price including tax. Round to the nearest cent. Find a function where f(0)=2 and f(1)=2 Observing, collecting data, surveying, and making inferences are all examples of an attempt to: a. learn about your audience b. analyze diversity c. make presentational adaptations d. None of the above. Please select the best answer from the choices provided A B C D Ma as an order, primates group of answer choices have very narrow, or specialized, dietary preferences. have highly specialized traits. lack traits that define the mammals. have generalized traits in the context of this article, what are the affects of prejudice? ARTICLE ANTI-JEWISH LEGISLATION IN PREWAR GERMANY which warning in washingtons farewell address influenced presidents throughout the 19th century? Question 5:[CLO3][PLO 11][C 3][10 Marks] (a) Find how much must be invested now at 11% compounded annually so that $15,000 will be accumulated at the end of five years? (b) Find how many years would be required to triple an amount at 8% compounded annually. Which of the following statements regarding a C corporation is TRUE?a)A C corporation is a separate entity for tax purposes.b)A C corporation passes through business income, losses, deductions, and credits directly to shareholders.c)Shareholders are generally held personally liable for the company's debts.d)Shareholders may be subject to self-employment tax on their share of a corporation's profits. In essence, the ordinance power gives the President the right toA) appoint federal employees.B) organize the judicial branch.C) administer laws.D) set up offices. How do I do this question ? Leonardo designed many machines hundreds of years in advance of their time, machines that were perfectly designed except for the fact that they lacked a means of _____________________ . What is the main risk of using the Internet for research purposes? How much did chevron pay in cash dividends to common shareholders during the first nine months of 2013? please provide your answer in millions without comma separator or decimal (ex: 343323456) what is the horizon problem? what is the flatness problem? how can these problems be resolved by the idea of inflation?