What is write the technical terms for the following statements. 3. A computer program that can hide and transfer from one computer to another without the notice of the user. ​

Answers

Answer 1

Answer:

I think it is computer virus I don't surly know


Related Questions

Write a python function that takes an array of integers and multiplies each one by 3.

Answers

def multiply(array):

   return [x * 3 for x in array]


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Question 4
Fill in the blank to complete the “increments” function. This function should use a list comprehension to create a list of numbers incremented by 2 (n+2). The function receives two variables and should return a list of incremented consecutive numbers between “start” and “end” inclusively (meaning the range should include both the “start” and “end” values). Complete the list comprehension in this function so that input like “squares(2, 3)” will produce the output “[4, 5]”.

Answers

The increment function will be written thus:

ef increments(start, end):

return [num + 2 for num in range(start, end + 1)]

print(increments(2, 3)) # Should print [4, 5]

print(increments(1, 5)) # Should print [3, 4, 5, 6, 7]

print(increments(0, 10)) # Should print [2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12]

How to explain the function

The increments function takes two arguments, start and end, which represent the inclusive range of numbers to be incremented.

The goal is to create a list of numbers incremented by 2 (n+2) using a list comprehension.

Learn more about functions on

https://brainly.com/question/10439235

#SPJ1

Take a number N as input and output the sum of all numbers from 1 to N (including N).​

Answers

Answer:

Incluint respuet

Explanation:

espero que te sirva

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Which sentence has correct parallel structure?
О А. The software allows users to create new documents, copying files from other sources, and saving new changes.
Users need a laptop, internet connection, and need an appropriate document editor.
SO B.
O C.
To install the application, connect the flash drive, run the setup, and restart the system.
OD.
The application bundle contains a DVD, the flash drive, and instruction manual.

Answers

The sentence that has parallel structure is "To install the application, connect the flash drive, run the setup, and restart the system." (opiton C)

What is parallel structure?

The repeating of a certain grammatical form inside a phrase is known as parallel structure (also known as parallelism). A parallel construction is created by making each comparable object or notion in your phrase follow the same grammatical pattern.

Consider this example: "I forgave you when you lost my cat, when you left me at the airport, and when you threw out my favorite stuffed animal." The parallel structure is the recurrent usage of I forgave you when you.

Hence, option C is correct.

Learn more about parallel structure:

https://brainly.com/question/8055410

#SPJ1

e Highlight
fogy
ст)
4 uses of information
communication technology in the health sector​

Answers

Answer: See explanation

Explanation:

The uses of information

communication technology in the health sector​ include:

• Improvement in the safety of patients through direct access to case story.

• Keeping track of the progress of the patient.

• Checking of the treatments for a disease it illness online.

• It's also vital for the electronic storage of the medical data.

You are working with a client who wants customers to be able to tap an image and see pricing and availability. As you are building the code in Java, what will you be using?


graphical user interface

icon public use

graphical public use

icon user interface

Answers

Answer:

A. Graphical user interface

Explanation:

In Java the graphical user interface is what manages interaction with images.

Answer: A.)

Explanation:

The answer is A because

I was born to rule the world

And I almost achieved that goal

(Giovanni!)

But my Pokémon, the mighty Mewtwo,

Had more power than I could control

(Giovanni!)

Still he inspired this mechanical marvel,

Which learns and returns each attack

(Giovanni!)

My MechaMew2, the ultimate weapon,

Will tell them Giovanni is back!

There'll be world domination,

Complete obliteration

Of all who now defy me.

Let the universe prepare,

Good Pokémon beware,

You fools shall not deny me!

Now go, go, go, go!

It will all be mine,

Power so divine

I'll tell the sun to shine

On only me!

It will all be mine,

Till the end of time

When this perfect crime

Makes history

Team Rocket! This is our destiny!

Listen up, you scheming fools,

No excuses, and no more lies.

(Giovanni!)

You've heard my most ingenious plan,

I demand the ultimate prize

(Giovanni!)

Now bring me the yellow Pokémon

And bear witness as I speak

(Giovanni!)

I shall possess the awesome power

In Pikachu's rosy cheeks!

There'll be world domination,

Complete obliteration

Of all who now defy me.

Let the universe prepare,

Good Pokémon beware,

You fools shall not deny me!

Now go, go, go, go!

It will all be mine,

Power so divine

I'll tell the sun to shine

On only me!

It will all be mine,

Till the end of time

When this perfect crime

Makes history

Team Rocket! This is our destiny!

To protect the world from devastation

To unite all peoples within our nation

To denounce the evils of truth and love

To extend our reach to the stars above

Jessie!

James!

There'll be total devastation,

Pure annihilation

Or absolute surrender.

I'll have limitless power,

This is our finest hour

Now go, go, go, go!

true or false you can create a. network with 2 computers?

Answers

Explanation:

true true jsjsdkdkskdkdksksksksk

Answer:

True :)

Explanation:

narrative report in computer system servicing

Answers

Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.

Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?

Answers

The counterterrorism alert system, it warns the government and key sectors ( such as drinking water companies and the energy sector) about terrorist threats

Which type of metal will rust - ferrous or non-ferrous?​

Answers

Explanation:

Ferrous metals contain IRON ...  which will rust (form Iron oxide)

type two statements. the first reads user input into person name. the second reads user input into person age. use the int() function to convert person age into an integer. below is a sample output for the given program if the user's input is: amy 4

Answers

The code in which the first reads user input into person name and the second reads user input into person age is in the explanation part.

What is coding?

We connect with computers through coding, often known as computer programming.

Coding is similar to writing a set of instructions because it instructs a machine what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.

The statement can be like::

person_name = input()

person_age = int(input())

print('In 5 years,', person_name,'will be',(5+person_age))

Thus, this can be the code for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.

Answers

Malware that is fileless as opposed to a typical virus would exhibit the behaviors and methods listed below. uses thin shell code and low-observability attack methods

What type of malware replicates over a network?Worms. Worms, one of the most popular forms of malware, spread across computer networks by taking advantage of flaws in the operating system. A worm is a standalone application that copies itself to infect further computers without any human intervention.Worms are computer programs that can copy themselves from one system to another without using a host file. The spread of a host file that is infected by a virus is necessary for its infection. A self-replicating program is referred to as a worm. Without a host program, it is self-contained. Without any assistance from the user, the application makes the copy and makes it run. For the purpose of spreading to other computer systems, worms frequently use network services.

To learn more about worm refer to :

https://brainly.com/question/23463888

#SPJ1

You are tasked with designing the following 3bit counter using D flip flops. If the current state is represented as A B C, what are the simplified equations for each of the next state representations shown as AP BP CP?

The number sequence is : 0 - 1 - 2 - 4 - 3 - 5 - 7 - 6 - 0

Answers

How to solve this

In the given 3-bit counter, the next state of A, B, and C (represented as A', B', and C') depends on the current state ABC.

The sequence is 0-1-2-4-3-5-7-6 (in binary: 000, 001, 010, 100, 011, 101, 111, 110).

The simplified next state equations for D flip-flops are:

A' = A ⊕ B ⊕ C

B' = A · B ⊕ A · C ⊕ B · C

C' = A · B · C

This counter follows the mentioned sequence and recycles back to 0 after reaching the state 6 (110). These equations can be implemented using XOR and AND gates connected to D flip-flops.

Read more about XOR and AND gates here:

https://brainly.com/question/30890234

#SPJ1

which of the following is a personal benifit of earning a college degree?
A) you have more friends
B) you are more likely to exercise
C) you are more likely to vote for the right candidate.
D) you have a longer life expectancy

Answers

Answer:

you have a longer life expectancy

Explanation:

Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.

Answers

Answer:

A better RPG game all the one that are existing are the same dull thing

Explanation:

Answer:

There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.

Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA

Answers

The  port which  is the fastest is  ESATA.

What is ESATA?

eSATA  can be described as the  SATA connector which can be access from outside the computer and it help to give the necessary  signal  connection that is needed for  external storage devices.

The eSATA serves as a version of the eSATA port which is been regarded as the  External SATA port, therefore, The  port which  is the fastest is  ESATA.

Read more on the port here:

https://brainly.com/question/16397886

#SPJ1

Are AWS Cloud Consulting Services Worth The Investment?

Answers

AWS consulting services can help you with everything from developing a cloud migration strategy to optimizing your use of AWS once you're up and running.

And because AWS is constantly innovating, these services can help you keep up with the latest changes and ensure that you're getting the most out of your investment.

AWS consulting services let your business journey into the cloud seamlessly with certified AWS consultants. With decades worth of experience in designing and implementing robust solutions, they can help you define your needs while executing on them with expert execution from start to finish! AWS Cloud Implementation Strategy.

The goal of AWS consulting is to assist in planning AWS migration, design and aid in the implementation of AWS-based apps, as well as to avoid redundant cloud development and tenancy costs. Project feasibility assessment backed with the reports on anticipated Total Cost of Ownership and Return on Investment.

Learn more about AWS consulting, here:https://brainly.com/question/29708909

#SPJ1

TO EXIT WORD YOU CLICK WHAT

Answers

File > Close
(Or the X in the corner?)

Answer:

To exit Word, you can click on the "File" menu and then click "Exit" or "Close".

Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.

Answers

Answer:

Answered below

Explanation:

#file is first opened and saved into file_object variable.

file_object = open('new_file.txt', 'r')

file_contents = file_object.readlines()

#the readlines() reads the contents of the file, line by line and returns a list of lines. Therefore, file_contents contains a list of lines read from file object and can be iterated over to get each line.

12.2 question 3 please help

Instructions

Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}

Answers

Answer:

def swap_values(dcn, key1, key2):

   temp = dcn[key1] # store the value of key1 temporarily

   dcn[key1] = dcn[key2] # set the value of key1 to the value of key2

   dcn[key2] = temp # set the value of key2 to the temporary value

positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}

print("Initial dictionary: ")

print(positions)

swap_values(positions, "C", "PF")

print("Modified dictionary: ")

print(positions)

Explanation:

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270



Please select the best answer from the choices provided

Answers

Answer:

c. $620

Explanation:

To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.

Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.

The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.

To find the security deposit, we subtract the first and last month's rent from the total move-in cost:

Security deposit = Total move-in cost - First and last month's rent

Security deposit = $1920 - $1300

Security deposit = $620

Therefore, the security deposit was $620.

Option c. $620 is the correct answer.

Anyone know how to do this?

Anyone know how to do this?

Answers

Answer:

bro it is simple click on text and click between the lines and u can write easily.

hope u mark me brainliest thank u ♡♡♡

yea you basically fill it in with the information that will be provided on another page

hope this helps : )

brainliest plz

Which of the following tasks are commonly performed in Restaurant and Food/Beverage Services jobs? Check all that apply.

Greeting customers
Handling luggage
Planning menus
Cooking food
Mixing drinks
Handling customer payments
Planning travel
Organizing fun activities

Answers

Answer:

a,c,d,e,f

Explanation:

Answer:

a,c,d,e,f

Explanation:

one edge

Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.

Answers

Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.

What are the research paper's impacts on cyberbullying?

The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.

Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.

To know more about the Cyber Bullying visit;

https://brainly.com/question/1460915

#SPJ1

Write a program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:


As long as x is greater than 0

Output x % 2 (remainder is either 0 or 1)

x = x // 2


Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.


Ex: If the input is:


6


the output is:


110


The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.

def int_to_reverse_binary(integer_value)

def string_reverse(input_string)


1:Compare output

2 / 2

Input

6

Your output

110

2:Unit test

0 / 2

Convert 19 to binary using int_to_reverse_binary() and string_reverse()

Your output

10011

Test feedback

string_reverse(user_input) did not return a value.

Your function may be missing a return statement.

3:Unit test

0 / 3

Convert 255 to binary using int_to_reverse_binary() and string_reverse()

Your output

11111111

Test feedback

string_reverse(user_input) did not return a value.

Your function may be missing a return statement.


def int_to_reverse_binary(int_number):
# print('i', int_number)
a = []
while int_number > 0:
a.append(int_number % 2)
int_number = int_number // 2
# print('a', a)
return a

def string_reverse(input_string):
print(''.join([str(i) for i in input_string])[::-1])



if __name__ == '__main__':
x = int(input())
# a = int_to_reverse_binary(x)
string_reverse(int_to_reverse_binary(x))

Answers

Answer: def int_to_reverse_binary(int_number):

   a = []

   while int_number > 0:

       a.append(int_number % 2)

       int_number = int_number // 2

   return a

def string_reverse(input_string):

   return ''.join([str(i) for i in input_string])[::-1]

if __name__ == '__main__':

   x = int(input())

   print(string_reverse(int_to_reverse_binary(x)))

Explanation:

The program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary is in the explanation part.

What is python?

Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation.

Here's the program in Python:

def decimal_to_binary(n):

   binary_string = ""

   while n > 0:

       binary_string += str(n % 2)

       n = n // 2

   return binary_string[::-1]

# test the function

print(decimal_to_binary(13))  # output: "1101"

Thus, in this program, the decimal_to_binary function takes a positive integer n as input and returns a string of 1's and 0's representing n in binary.

For more details regarding python, visit:

https://brainly.com/question/30427047

#SPJ1

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

Other Questions
where different temperature limitations of individual components are applied to a single circuit, the principle of the ? is often used to determine the temperature rating of the entire circuit. a client has been prescribed a one-time dose of 4 mg morphine iv. the medication is available in ampules of 10 mg/ml. what volume of morphine should the nurse draw up? Find the volume of the solid below. Uh hi i think i have like a toothpaste allergy like you know those small bumps are your mouth yeah i'm getting does but like its still starting like on a side of my mouth. should i be worried or anything? A grain dealer sold to one customer 6 bushels of wheat, 3 of corn, and 6 of rye, for $45.90; to another, 3 of wheat, 6 of corn, and 6 of rye, for $49.20; and to a third, 6 of wheat, 6 of corn, and 3 of rye, for $41.40. What was the price per bushel for corn What was the name of the african american unit that also played a key role in the battle of san juan hill?. Find the distance between points(-8,-2), (8,3) Help! 50 points Need it today China's Three Sovereigns and Five Emperors (collectively known as ancient Chinese characters)? . the ability to manufacture many goods at once is called _____ production. What are Clancy's reasons for why we need to understand "weird" beliefs? What do you think about Poppy and Clancy's arguments for why it is important to understand and test these "weird" claims/beliefs? List 3 topics you think need the same level of critical thinking applied to them. AND explain why you think they need critical thinking applied to them. Suppose x has a normal distribution with mean 80 and standard deviation 5. What is the 90th percentile of x?. If the republicans gain control of the house, what will the consequences be for the issue of abortion?. What was the major problem about calculating longitude on the ocean that Harrison solved? The Lagan family bought a $150,000 home in 2002. They obtained a mortgage loan for 30 years. The monthly payments, not including property taxes and insurance, are $895.00. Assuming these monthly payments do not change, how much interest will be paid on the house during the 30 years The area behind an island arc that develops a spreading center is a(n) Multiple Choice a.back-arc basin. b.trench. c.abyssal plain. d.passive margin. Solve the equation for mQ=mL True/False: Hamilton was the father of American communism, under what conditions would a parcel of air rise relative to other air in the atmosphere? the sum of kyras and calebs age is 37. calebs age is equal to twice the quantity of kyras age decreased by 4. let k represent kyras age.