Cassandra is likely seeing the radiology technician and dietician for a weight-loss plan.
What is technician?
A technician is a professional who has specialized knowledge in a specific area, such as computers, electronics, engineering, mechanics, and other technical fields. Technicians are often responsible for troubleshooting, installing, repairing and maintaining equipment, as well as providing technical support and advice to customers.
They typically have a wide range of skills and knowledge and may specialize in a certain type of equipment. Additionally, technicians may be required to develop and test new equipment, or to manage a team of other technicians.
1. Cassandra is likely seeing the radiology technician and dietician for a weight-loss plan. The radiology technician will likely take images of her body to give her an idea of where she is starting from and to provide a baseline for tracking her progress. The dietician will help her create a meal plan and discuss how to make healthy choices that will support her goals.
2. The Health Science and Law, Public Safety, Corrections, and Security clusters are both focused on helping people, but the Health Science cluster focuses on providing medical care and promoting health, while the Law, Public Safety, Corrections, and Security cluster is focused on protecting people and maintaining justice and order.
3. Let's say Vlad is interested in being a police officer. In this job, empathy is important in order to build relationships with the community and to understand how to best help people. At the same time, critical thinking skills are essential in order to make quick decisions and assess the situation in order to keep everyone safe.
4. University administrators are responsible for managing the day-to-day operations of a university, such as budgeting, fundraising, and managing staff. Because of the level of responsibility and the importance of the job, university administrators tend to make a higher salary than most other careers.
5. Foreign service officers are part of the Government and Public Administration cluster because they are responsible for representing their country in foreign nations. This includes managing economic, cultural, and diplomatic relations with other countries, which are all tasks that are part of the duties of a government official.
To learn more about technician
https://brainly.com/question/18428188
#SPJ1
As you learned in the Learning Activity titled, "What is a Database?" databases are used by organizations to manage large amounts of data. Assume you are the database administrator for a small company and you have been asked to merge data from a new supplier into your inventory. Based on the various types of databases discussed in the Learning Activity titled, "Knowing Databases", what type of database would be most appropriate for your company and why? What factors would influence your decision? What are some considerations you would consider if you want to ensure your database is scalable and could support future growth?
For the given scenario, a relational database would be the most suitable choice
How can this be used?Structured data management and intricate interconnections between entities, such as suppliers and inventory items, are efficiently handled by relational databases.
The decision is being influenced by various factors such as the coherence of data, its reliability, and the potential to execute intricate inquiries. In order to guarantee the potential for expansion and accommodate future development, it is crucial to make thoughtful decisions such as selecting a database management system that facilitates horizontal scaling, enhancing the design of the schema, improving indexing and query efficiency, and supervising the system for performance adjustments and capacity forecasting.
Implementing these measures would facilitate the effective management of growing amounts of data without compromising scalability.
Read more about relational database here:
https://brainly.com/question/13262352
#SPJ1
Miss Jones is a small business entrepreneur who currently does everything manually. She is the
head chef at her small cook shop which has many loyal repeat customers. Her assistant helps with
cooking as well as the paperwork. Miss Jones also employs someone to makes deliveries to
customers. Customers order via telephone and everything is handwritten.
There are various issues such as missing orders, receipts and customer contact information. Two
stand-alone computers and a printer are in the office. One computer is not working due to a virus
and the other is not connected to the printer so no printing can be done at this time. The assistant
accidentally deleted all files on this second computer which therefore is not being used.
A. Advise Miss Jones of TWO (2) advantages of setting up a computer network. 4 marks)
B. Describe TWO (2) network hardware that Miss Jones will need. (4 marks)
C. Which wired transmission medium would you recommend? Why? (3 marks)
D. What TWO (2) risk management strategies would you recommend? Give reasons for
your answer. (4 marks)
E. Miss Jones has decided to keep customer data in an electronic database to help the
situation. If you were to create a table to hold customer data, what FOUR (4) fields
would you include? (2 marks)
F. Other than customers calling in, which office automation technology could be used to
capture orders? Give reasons for your answer. (3 marks)
Match the term to its use in creating perspective.
1. placement
2. size
3. color
4. converging lines
A. Lines merging into a distance create
an illusion of depth.
B. The position of a shape relative to the
horizon affects your perception of depth.
C. Adds spatial depth to a shape.
D. A smaller shape, placed appropriately,
appears more distant than a similar
larger shape.
Answer:
1. POSITION - The position of a shape relative to the
horizon affects your perception of depth.
2. CONVERGING LINES- Lines merging into a distance create
an illusion of depth.
3.COLOR- Adds spatial depth to a shape.
4. SIZE - A smaller shape, placed appropriately,
appears more distant than a similar
larger shape.
took test on PLATO. 100%
find four
reasons
Why must shutdown the system following the normal sequence
If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.
"init 0" command completely shuts down the system in an order manner
init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.
İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0
shuts down the system before safely turning power off.
stops system services and daemons.
terminates all running processes.
Unmounts all file systems.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
Please define identity theft
Answer:
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss
Explanation:
Compare and contrast the code of ethics of two professional organizations or regulatory bodies in computer science field. Analyze the similarities and differences between the codes, and discuss their implications for professional practice. Critically evaluate the strengths and weaknesses of each code and propose recommendations for improving ethical standards in the profession.
Ethical standards upheld in the computer science field are set forth by reputable professional organizations like ACM and AAAI.
How is this so?Both these organizations advocate for values promoting honesty, integrity, privacy protection and respect towards every individual's dignity.
While focus on educational growth is central to the ACM code of ethics, more significant emphasis seems laid down by AAAI for researchers in artificial intelligence fields to consider broader society concerns related to potential impact with AI research practices.
The codes derive their strength from placing significant stress on ethical behavior and acknowledging the influence of technology on society.
Learn more about Ethical Standards;
https://brainly.com/question/28295890
#SPJ1
c = 1 sum = 0 while (c < 10): c = c + 2 sum = sum + c print (sum)
Answer:
35
Explanation:
The loop runs 5 times with the following values of c: 1,3,5,7,9 at the start of the iteration, and 2 higher at the end. So the values that get added to sum are: 3,5,7,9,11, hence sum = 3+5+7+9+11 = 35.
Always look carefully at the last iteration of a loop. At the last iteration, when c equals 9, it is still valid to make another iteration. However, 11 gets added to the sum.
\(\huge \boxed{\sf 35}\)
c = 1, sum = 0
(The loop runs)
1 < 10, c = 1 + 2, sum = 0 + 3
c = 3, sum = 3
3 > 10, c = 3 + 2, sum = 3 + 5
c = 5, sum = 8
5 > 10, c = 5 + 2, sum = 8 + 7
c = 7, sum = 15
7 > 10, c = 7 + 2, sum = 15 + 9
c = 9, sum = 24
9 > 10, c = 9 + 2, sum = 24 + 11
c = 11, sum = 35
(The condition is false and the loop ends)
11 > 10, print sum
An employee receives a phone call from someone saying they are from the bank.
What kind of call is this?
An employee receives a phone call from someone saying they are from the bank. This type of call indicates Phishing.
What are banks?Banks are referred to as financial institutions that help in borrowing or lending money to investors and help in depositing money for savings and withdrawing cash whenever needed.
A type of fraud where an intruder pretends to be a reputable company or individual in letters or other forms of electronic communication is referred to as Phishing. Hackers frequently use malicious email to deliver malicious attachments or links that can carry out a variety of activities.
In these cases, employees receive a call from someone stating that they are from banks reflects the activity of Phishing. This types of call usually misguide people and ask them for password and other credentials in the name of verification and fraud.
Learn more about Phishing, here:
https://brainly.com/question/24156548
#SPJ2
Three enhancements with the following speedups are proposed for a new machine: Speedup (a) = 30, Speedup (b) = 20, and Speedup (c) = 15.
Answer:
mark me brainlist please
Explanation:
Three enhancements with the following speedups are proposed for a new machine: Speedup (a) = 30, Speedup (b) = 20, and Speedup (c) = 15. C should be have highest enhancement.
What is speedups?Speedup is a metric used in computer architecture to compare how two systems perform when solving the same task.
Technically speaking, Speedup is the increase in task execution speed when performed on two comparable architectures with various resources.
Further Amdahl's law, which was primarily focused on parallel processing, developed the idea of speedup. However, speedup can be applied more broadly to demonstrate how resource improvements affect performance.
\({\displaystyle L = frac 1 v = frac T W, where L = frac 1 v = frac T W.\)
Where v is the task's execution speed, T is the task's execution time, and W is the task's execution workload.
Further The rate at which a task is executed is the throughput of an architecture:
\(displaystyle Q=rho vA=frac rho AWT=frac rho AL, Q=rho vA=frac rho AWT=frac rho AL\)
Throughput and latency are two different types of quantities for which speedup can be defined. The relationship between latency and task execution speed is reciprocal.
Learn more about speedups:
https://brainly.com/question/29848325
#SPJ2
what is keyboard buffer tell me the answer nicely and I will give brainlitst
Answer:
A keyboard buffer is a very small partition of memory that is usually stored in the computer memory in random access memory (RAM) and captures all the keystrokes made on a keyboard.
Explanation:
What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.
Answer:
In a class of statistics course, there are 50 students, of which 15 students scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring
not F?
Explanation:
Answer:
its b it's like opening multiple tabs
Can someone help me fix my code for this question? got pretty far but now i'm stuck on the syntax error.
In this lab, you use what you have learned about parallel arrays to complete a partially completed C++ program. The program should:
Either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop
Or it should print the message Sorry, we do not carry that.
Read the problem description carefully before you begin. The file provided for this lab includes the necessary variable declarations and input statements. You need to write the part of the program that searches for the name of the coffee add-in(s) and either prints the name and price of the add-in or prints the error message if the add-in is not found. Comments in the code tell you where to write your statements.
Instructions
Study the prewritten code to make sure you understand it.
Write the code that searches the array for the name of the add-in ordered by the customer.
Write the code that prints the name and price of the add-in or the error message, and then write the code that prints the cost of the total order.
Execute the program by clicking the Run button at the bottom of the screen. Use the following data:
Cream
Caramel
Whiskey
chocolate
Chocolate
Cinnamon
Vanilla
The Gdb one is what i have so far but i can't figure out what i'm doing wrong as far as syntax.
To be able to complete the code that can be used to searching a coffee add-in in an array as well as printing its name and price, look at the example of the implementation in C++ that is given below
What is the syntax error?In the code that is known to be given, one can declare as well as initialize two arrays - addIns that can be used for saving the names of coffee add-ins, as well as the prices for saving of the prices of the all of the corresponding add-ins.
Therefore, We can be able to collect input from a given customer for the coffee add-in they need to order. Finally, we can be able to make use of an if-else statement to be able to print the name and price of all ofthe add-i.
Learn more about syntax error from
https://brainly.com/question/28957248
#SPJ1
Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at
your school.
Answer: You don't want to download any virus and Chat rooms with stranger can be harmful
Explanation: You can get a virus on your school device, get yourself in harmful situations and your passwords might not be safe
The bank offers the following types of accounts to its customers: saving accounts, checking accounts and money market accounts. Customers are allowed to deposit money into an account (thereby increasing its balance), withdraw money from an account (thereby decreasing its balance) and earn interest on the account. Each account has an interest rate
Assume that you will write the code for an application that will calculate the amount of interest earned for a bank account.
a. Identify the potential classes in this problem domain be list all the nouns
b. Refine the list to include only the necessary class names for this problem
c. Identify the responsibilities of the class or classes.
Suppose a Java method receives a List and reverses the order of the items it contains by removing each item from the front of the list, pushing each item onto a Stack, and after all items are pushed, popping the items from the stack and inserting each item at the end of the list. Assume push and pop are O(1). What is the expected Big-O running time if: a. If an ArrayList is passed. Explain your answer. b. If a Linked List is passed. Explain your answer.
Answer:
poop poop poopoop poop pooop
Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't work as well for travelling employees in locations with unreliable or no internet access. What steps could remote users take to keep access to important folders on the road?
Explanation:
Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.
Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.
I am in class 7 should I go with java or python.
Answer:python
Explanation:
it’s a good coding program
Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks]
The Java code for the TestElection class that does the tasks is
java
import javax.swing.JOptionPane;
public class TestElection {
public static void main(String[] args) {
// Declare an array to store objects of the Election class
int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of candidates:"));
Election[] candidates = new Election[length];
// Request values from the user to initialize the instance variables of Election objects and assign these objects to the array
for (int i = 0; i < length; i++) {
String name = JOptionPane.showInputDialog("Enter the name of candidate " + (i + 1) + ":");
int votes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes for candidate " + (i + 1) + ":"));
candidates[i] = new Election(name, votes);
}
// Determine the total number of votes
int totalVotes = 0;
for (Election candidate : candidates) {
totalVotes += candidate.getVotes();
}
// Determine the percentage of the total votes received by each candidate and the winner of the election
String winner = "";
double maxPercentage = 0.0;
for (Election candidate : candidates) {
double percentage = (double) candidate.getVotes() / totalVotes * 100;
System.out.println(candidate.getName() + " received " + candidate.getVotes() + " votes (" + percentage + "%)");
if (percentage > maxPercentage) {
maxPercentage = percentage;
winner = candidate.getName();
}
}
System.out.println("The winner of the election is " + winner);
}
}
What is the arrays about?In the above code, it is talking about a group of things called "candidates" that are being saved in a special place called an "array. " One can ask the user how long they want the list to be using JOptionPane and then make the list that long.
Also based on the code, one can also ask the user to give us information for each Election object in the array, like the name and number of votes they got, using a tool called JOptionPane.
Learn more about arrays from
https://brainly.com/question/19634243
#SPJ1
Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks] Write the Java code for the main method in a class called TestElection to do the following: a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user. [3 marks] b) Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. [5 marks] c) Determine the total number of votes and the percentage of the total votes received by each candidate and the winner of the election. The sample output of your program is shown below. Use methods from the System.out stream for your output.
An integrated circuit RAM chip has a capacity of 512 words of 8 bits each where the words are organized using a one-dimensional layout.a) How many address lines are there on the chip?b) How many such chips would be needed to construct a 4Kx16 memory?c) How many address and data lines needed for a 4Kx16 memory?#addresss lines = #data lines =
Answer:
A. 9
B. 16
C. Number of addresses = 12 number of data lines = 16
Explanation:
The capacity of this chip is 512 x 8
That is 512 words and these words have 8 bits
A. The number of the address lines would be
log2(512) = 2⁹
So the answer is 9
B. The total number of chips required
= 512 x 8 = 4096
(4096 x 2)/ 512 = 16
C. Number of address = log4092 = 2¹²
= 12
The number of data lines = 8x2 = 16
Thank you!
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
Most operating system have GUI as part of the system, which is the following best describes an operating system GUI
A Graphical User Interface (GUI) is the component of an operating system that allows users to communicate with the system using graphical elements. GUIs are generally used to give end-users an efficient and intuitive way to interact with a computer.
They provide an easy-to-use interface that allows users to manipulate various objects on the screen with the use of a mouse, keyboard, or other input device.The primary function of an operating system GUI is to make it easier for users to interact with the system.
This is done by providing visual feedback and a simple way to access various system functions. GUIs can be customized to suit the user's preferences, which means that they can be tailored to meet the specific needs of different users.Some of the key features of a GUI include the use of windows, icons, menus, and buttons.
Windows are used to display information and applications, while icons are used to represent various objects or applications on the screen. Menus and buttons are used to provide users with a way to access various system functions, such as saving a file or printing a document.
The use of a GUI has become a standard feature of most operating systems. This is because GUIs make it easier for users to interact with computers, and they provide an efficient and intuitive way to access various system functions.
For more such questions on Graphical User Interface, click on:
https://brainly.com/question/28901718
#SPJ8
Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language
Answer:
Explanation:
The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.
import random
def addDigits(num):
sum = 0
for x in str(num):
sum += int(x)
return sum
sum = addDigits(random.randint(222, 1000))
while True:
myRandomNum = random.randint(2, 99)
if (sum % myRandomNum) == 0:
print("No remainder between: " + str(sum) + " and " + str(myRandomNum))
break
Which of the following are downlink transport channels?
a. BCH.
b. PCH.
C. RACH.
d. UL-SCH.
e. DL-SCH.
Error on line 14, any ideas why?
In general, there could be several reasons why an error occurs on line 14 of a code such as
Syntax ErrorUndefined VariableNull or Undefined ValueIndex Out of BoundsWhat is code error?Mistake with the way the code is written: Look for spelling errors, missing symbols, like brackets or semicolons, or other mistakes in line 14 or nearby code. Make sure your code follows the right grammar rules of the programming language you're working with.
Check if the variable on line 14 has been properly set up before using it. If something isn't explained or isn't being talked about, it can cause a mistake.
Learn more about code error from
https://brainly.com/question/33237152
#SPJ1
Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command
Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.
Writting the code:Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
Number of DB pages allocated = 270
Sweep interval = 20000
Forced Writes are ON
Transaction - oldest = 190
Transaction - oldest active = 191
Transaction - oldest snapshot = 191
Transaction - Next = 211
ODS = 11.2
Default Character set: NONE
Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
...
Default Character set: NONE
See more about SQL at brainly.com/question/19705654
#SPJ1
1. Explain all the types of computer virus
Answer:
1.File infecting virus
A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.
2. Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.
4. Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.
5. Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.
6. Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
7. Resident Virus
A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.
Explanation:
hope its help
thank you
How does defragmentation improve performance?
Answer:
Regularly running the Disk Defragmenter utility improves system performance.
Does the fact ¬Spouse(George,Laura) follow from the facts Jim ≠ George and Spouse(Jim,Laura)? If so, give a proof; if not, supply additional axioms as needed. What happens if we use Spouse as a unary function symbol instead of a binary predicate?
Yes, based on the facts Jim, George, and Spouse, the fact Spouse (George, Laura) follows.(Jim, Laura).The axioms would need to be changed if Spouse were to be used as a unary function symbol rather than a binary predicate because it would only accept one input rather than two otherwise.
What operators are unary operators?A unary operator in the C programming language is a single operator that performs an operation on a single operand to create a new value. Operations like negation, increment, decrement, and others can be carried out by unary operators.
Binary: Is it a unary?Binary and unary operators are the two categories of mathematical operations. Unary operators only require a single operand to accomplish an action. With two operands, binary operators can perform operations. The order of evaluation in a complex expression (one with two or more operands) is determined by precedence rules.
To know more abut unary visit:
https://brainly.com/question/30531422
#SPJ1
PHP server scripts are surrounded by delimiters, which? *
Answer:
The default delimeters are <?php ... ?>
Explanation:
They can however be adjusted. It is common enough to find it written instead as:
<? ... ?>
But from the question your answering, the third option is correct.