a _____ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.

Answers

Answer 1

The blank can be filled with the word "macro virus". A macro virus is a type of computer virus that infects documents, spreadsheets, and other types of files that support embedded macros.

A document is a written or printed record that provides information or evidence about a particular topic or subject. It can take many forms, including letters, reports, contracts, and certificates. Documents are essential in many aspects of our lives, from personal to professional, and serve as a means of communication, record-keeping, and reference. The importance of accurate and well-written documents cannot be overstated, as they can impact decisions and outcomes in many areas, including legal matters, financial transactions, and academic pursuits. With the advent of digital technology, documents can now be created, stored, and shared electronically, making access to information easier and more efficient than ever before.

Learn more about  document here:

https://brainly.com/question/30363534

#SPJ11


Related Questions

which tool for data analysis can be leveraged by organizations with an erp and a centralized database to identify unique patterns and correlations that can help guide business decisions?

Answers

Organisations with either an ERP and a single database can utilize artificial intelligence as a tool for data analysis to find unusual patterns and connections that can assist inform business choices.

What are instruments for data analysis?

Data analysis techniques are applications and programs that gather and evaluate data about a company, its clients, and its competitors in order to streamline operations and help decipher patterns so that choices may be made using the data.

Excel data analysis: What is it?

Excel's Analyze Data feature gives you the ability to think critically about your data in normal language rather than needing to create laborious algorithms. Additionally, high-level visual reports, trends, and patterns are offered by Analyze Data.

To know more about Data Analysis visit :

https://brainly.com/question/12941229

#SPJ4

9.4 Code Practice
The question is in the photo because this would’ve been too long to type and this is in Python

I need this kinda asap!

(Sorry for asking a lot and I’m sorry if the photo is hard to see I tried my best to get everything)

9.4 Code Practice The question is in the photo because this wouldve been too long to type and this is

Answers

I've included my code in the picture below. Best of luck.

9.4 Code Practice The question is in the photo because this wouldve been too long to type and this is
9.4 Code Practice The question is in the photo because this wouldve been too long to type and this is

Dependence and addiction will make you
a drug.

Answers

Answer: When a person stops taking a medicine, their body goes through "withdrawal":

If you find yourself part of a team at work what is the best way to behave during a team meeting

Answers

Answer:

Being part of a team at work requires effective communication, collaboration, and coordination.

Explanation:

If you find yourself part of a team at work what is the best way to behave during a team meeting

Being part of a team at work requires effective communication, collaboration, and coordination. To behave appropriately during a team meeting, consider the following tips:

Be prepared: Review the meeting agenda and come prepared with any necessary materials, reports, or data that might be required for the discussion.

Be attentive: Stay focused on the discussion and avoid distractions such as using your phone, checking emails, or engaging in side conversations.

Listen actively: Listen to what others are saying without interrupting or judging. Consider their ideas and opinions respectfully.

Speak up: Share your thoughts and ideas when it is your turn to speak. Speak clearly and concisely, and avoid interrupting others or dominating the conversation.

Be collaborative: Encourage participation and collaboration from all team members. Build on others' ideas and work towards consensus where possible.

Stay on topic: Stay focused on the agenda items and avoid getting sidetracked by unrelated issues or discussions.

Be respectful: Treat everyone with respect and avoid using derogatory language, criticizing others, or making personal attacks.

Take responsibility: If you have been assigned any action items or responsibilities during the meeting, take ownership of them and follow up on them promptly.

By following these tips, you can contribute to a productive and positive team meeting that helps move the team forward towards its goals.

What is the difference between true experimental designs and quasi-experimental designs?

Answers

The main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.

What is an experimental design?

An experimental design is any type of procedure during experimentation used to test a given explanation of a hypothesis by employing the scientific method.

Experimental designs are randomized in order to avoid any type of biases that may alter the collected data from the sampling method.

In conclusion, the main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.

Learn more about experimental designs here:

https://brainly.com/question/17280313

#SPJ1

Difference between Hard copy and Soft copy?​

Answers

Answer: a hard copy is a printed or physical copy of a document, while a soft copy is a virtual or online copy of the document that is stored on your hard drive or computer.

Explanation:

A ________ is two or more computers that share resources. A) computer network B) network resource C) peer-to-peer network D) client

Answers

Answer:

computer network

Explanation:

A computer network is two or more computers that share resources. All of the computers in a network are connected together and can share various resources depending on the scenario such as memory, space, computing power, graphical power, etc. The most common shared resource is connection to the internet.

Help pls I don’t exactly remember this L

Help pls I dont exactly remember this L

Answers

Answer:

This is because when the codes are viewed by someone else or the code is getting too big, it gets confusing, hence it is easier if the ID has a meaningful name.

Can an HTML file be edited by people?
a. No, HTML is a special format that is unreadable to people.
b. No, the Internet's governing body does not allow people to view HTML files.
c. Yes, but humans cannot make sense of HTML due to such files being mostly 0's and 1's.
d. Yes, because HTML is just normal text, with tags throughout (though some HTML is hard to read).

Answers

The correct answer is d. Yes, because HTML is just normal text, with tags throughout (though some HTML is hard to read).

HTML (Hypertext Markup Language) is a markup language used for creating web pages. It is a plain text file that contains markup tags to specify the structure, content, and formatting of a web page. Since HTML is a plain text file, it can be opened and edited with any text editor.

Although HTML files may contain tags that make them appear cluttered and difficult to read for some people, they can be edited and modified by anyone with knowledge of HTML tags and syntax. There are also various HTML editors and Integrated Development Environments (IDEs) that make editing and creating HTML files easier and more user-friendly for web developers and designers.

Learn more about html here:

https://brainly.com/question/17959015

#SPJ4

how do u type faster

Answers

Answer:

by learning the right home keys and how to place the fingers

Explanation:

the left hand side : A,S,D,F

the right hand side: :, L, K, J

the two little fingers are guide keys

guide keys: letter A and column

hi pls help me how to connect my imac to our wifi cause it’s not showing the wifi option (use pic for reference)

hi pls help me how to connect my imac to our wifi cause its not showing the wifi option (use pic for

Answers

Your searching in Bluetooth not wifi you need to switch it

If you and a partner are trying to find an issue with a code, what are the steps you would take to find the issue and correct the problem?

Answers

Answer:

first take a look which page have a problem. then find the problem in the page source code..usually just forgot to put ;

What is BASIC programming language?​

Answers

BASIC (Beginner’s All-purpose Symbolic Instruction Code) is a programming language designed by John Kemeny and Thomas Kurtz in 1964 and popularized by Microsoft in the 1970.

BASIC,

in full (Beginner's All-purpose Symbolic Instruction Code,) computer programming language developed by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in the mid 1960s.

FORTRAN

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to do

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to doplease make me brainalist and keep smiling dude I hope you will be satisfied with my answer

These statements describe LANs. SELECT ALL THAT APPLY
1) are not able to connect to the Internet
2) connect networks over a large geographic area
3) don't have to be connected to other networks
4) located in one building or adjacent buildings
5)wires connecting the network owned by the organization

Answers

Local area networks connect computers and give users shared access to printers, data, and other resources. Peer-to-peer or client-server architectures are the two main types of local area network architecture. Thus, option B, D, E is correct.

What is the significance of local area network?

Computers may swiftly and readily exchange data and messages using local area networks. This expedites the process and saves time.

Therefore, Any user on the network can send and receive messages and data using LAN. Users can access the server-stored data via the network from any computer.

Learn more about local area network here:

https://brainly.com/question/1167985

#SPJ1

following the filing of a full and complete license application by a finance lender as well as the receipt of the relevant fees, the commissioner must either issue a license or file a statement of issues within:

Answers

After a finance lender files a complete license application and pays the fees, the commissioner has 120 days to either issue a license or file a statement of issues. It is crucial to submit a complete application and address any issues promptly to ensure a smooth process.

Following the filing of a full and complete license application by a finance lender as well as the receipt of the relevant fees, the commissioner must either issue a license or file a statement of issues within 120 days.

The answer is that the commissioner must either issue a license or file a statement of issues within 120 days. To ensure that the process runs smoothly, it is important to submit a complete application along with the required fees for the lender's license.

Within 120 days, the commissioner must act on the license application by issuing a license or filing a statement of issues. However, if the commissioner files a statement of issues, the finance lender will have to go through a hearing process to resolve any issues.

As a result, it is critical to make sure that the initial application is complete and that any issues are resolved as soon as possible so that the process can continue without interruption.

Learn more about license application: brainly.com/question/12928918

#SPJ11

When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by standing in front of it. Which emerging technology does Cloud combine with to enable this medallion's features?

Answers

Answer:

The Ocean Medallion.

Explanation:

The Ocean Medallion is a handheld interface that, on boarding a cruise liner, digitally attaches to multiple devices. They could order a cocktail with their mobile or instantly open the cockpit door by walking in front of something while a guest wears the ocean medallion.

Write a program that continually reads user input (numbers)
until a multiple of 7 is provided. This functionality must be
written in a separate function, not in main().

Answers

Here is a Python program that continually reads user input (numbers) until a multiple of 7 is provided. This functionality is written in a separate function, not in main(). The program uses a while loop to keep reading input until the user enters a multiple of 7:```def read_until_multiple_of_7():

x = int(input("Enter a number: "))  

while x % 7 != 0:    

x = int(input("Enter another number: "))  print("Multiple of 7 detected: ", x)```Here's how the code works:1. The function `read_until_multiple_of_7()` is defined.2. The variable `x` is initialized to the integer value entered by the user.3. A while loop is used to keep reading input until the user enters a multiple of 7.

The loop condition is `x % 7 != 0`, which means "while x is not a multiple of 7".4. Inside the loop, the user is prompted to enter another number. The input is read as an integer and stored in the variable `x`.5. When the user finally enters a multiple of 7, the loop exits and the function prints a message indicating that a multiple of 7 was detected, along with the value of `x`.Note: Make sure to call the `read_until_multiple_of_7()` function from your `main()` function or from the interactive interpreter to test it out.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ11

the meaning of belt drives

Answers

Answer:

A belt drive is a transmission system that uses a flexible strip to transfer power. The turning disk is connected by a belt drive to the electric motor. A rubber belt drive is used to transfer power from one pulley to another. A belt drive is a transmission system that uses a flexible strip to transfer power.

Explanation:

Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)

Answers

Answer:

dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.

------------------------------------------------------------------------------------------------------------

dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.

Explanation:

which of the following is an html-supported kind of path?

Answers

An html-supported kind of path is D.Both A and B (absolute, and relative).

What is HTML, and what purposes does it serve?

The language used to describe the organization of Web pages is called HTML. Authors can publish online documents containing headings, text, tables, lists, images, etc. thanks to HTML. Click a button to quickly access internet content using hypertext links.

The set of markup symbols or codes entered into a file intended for display on the Internet is known as HyperText Markup Language (HTML). The markup instructs web browsers on how to display the text and pictures on a web page.

Learn more about html at;

https://brainly.com/question/17959015

#SPJ1

complete question;

which of the following is an html-supported kind of path?

A.absolute

B.relative

C.interpreted

D.Both A and B

PLSS help im so desperate!! 30 pts n brainliest
This is for intro to network systems//// I will delete invalid answers! I rlly need help

Question: Explain each kind of pointer and for what it is appropriate.

Answers

hope someone helpsssss

A pointer is nothing but a memory location where data is stored. A pointer is used to access the memory location. There are various types of pointers such as a null pointer, wild pointer, void pointer and other types of pointers.  When you want to deal different variable data type, you can use a typecast void pointer.

If you give someone ______ to your device, they can control it through another phone or computer.

Answers

If you give someone Remote access to your device, they can control it through another phone or computer.

What is  Remote entry?

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

There is a risk of device loss or theft due to a lack of physical security safeguards.as the data is transmitted through a public internet, eavesdropping.unapproved access to systems or data, possibly while oblivious to the screen.If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

https://brainly.com/question/28900477
#SPJ1

One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts. This complexity is caused by not only having to access data from separate databases, but also from:

Answers

Answer:

A) the possibility of a new generation of inconsistent data systems, the data marts themselves

Explanation:

These are the options for the question

A) the possibility of a new generation of inconsistent data systems, the data marts themselves.

B) lack of user training.

C) denormalized data.

D) incongruent data formats.

Data mart can be regarded as data warehouse which is oriented to particular business line. Data marts can be divided into three types and they are dependent data Mart, independent data Mart and hybrid.

Independent data marts, can be regarded as data marts that can stand on it's own , it is a system which is built and can draw data from operational /external source of data directly. Some characteristics of independent data Mart is that they are Independently built by autonomous team from each other. It should be noted that One important characteristic of independent data marts is complexity for end users when they need to access data in separate data marts. This complexity is caused by not only having to access data from separate databases, but also from the possibility of a new generation of inconsistent data systems, the data marts themselves

If a DTC has not been set, then the vehicle is running perfectly

Answers

The statement that "if a DTC has not been set, then the vehicle is running perfectly" is not entirely accurate.

While the absence of diagnostic trouble codes (DTCs) can indicate that a vehicle is functioning normally, it is not a guarantee that everything is running perfectly. There may be issues with a vehicle's performance or components that are not significant enough to trigger a DTC, but could still impact the overall operation and longevity of the vehicle. Additionally, some issues may only manifest themselves under certain conditions or during specific driving situations, which could make them difficult to diagnose without the help of a qualified mechanic. Therefore, while the lack of DTCs can be a good sign, it is not a foolproof indicator of a perfectly running vehicle.

To know more about diagnostic visit:

https://brainly.com/question/14697946

#SPJ11

When two or more computers can communicate together they are connected by a

Answers

they form a network. When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.
Hope this helps

which members of the following class are private?class employee { string name; double salary; double to hourly(double); void set name(string); string get name(); void set salary(double); double get salary(); double get weekly salary(); double get monthly salary();} of of of the data members, but none of the member of them except for the getter and setter functions

Answers

The data members "name" and "salary" of the class employee are private. The getter and setter functions are the only way to access or modify these private data members from outside the class.

This is an example of encapsulation, where the internal details of the class are hidden and can only be accessed through specific methods. This helps to ensure the integrity of the data and prevent unintended modifications.
Hi, to answer your question about which members of the given employee class are private: In the provided class definition, you did not specify the access specifiers (public, protected, or private) for the members. In C++, if no access specifier is provided, class members are private by default. So, all the data members and member functions in the employee class are private.

Class definition: class employee {string name; double salary; double to_hourly(double); void set_name(string); string get_name();  void set_salary(double)  double get_salary();  double get_weekly_salary();  double get_monthly_salary();
} Please note that it is generally good practice to make data members private and provide public getter and setter functions to access and modify them. This helps maintain data integrity and encapsulation in your code.

To know more about data visit:

https://brainly.com/question/30051017

#SPJ11

This type of cable is used to connect the keyboard and mouse to the computer:

PS/2 cable
Ethernet cable
HDMI cable
DVI cable​

Answers

Answer:

I'm going to have to go with PS/2 cable

Explanation:

did some research

it's the ps/2 cable

ethernet cables are for wifi

hdmi connects computer to the monitor

dvi connects to an older type of monitor

memory that holds instructions the computer uses to start up the os
ROM
UNIX
System Files
RAM.

Answers

The memory that holds instructions the computer uses to start up the operating system (OS) is the ROM (Read-Only Memory).

ROM, or Read-Only Memory, is a type of computer memory that stores permanent instructions or data that cannot be modified or erased by normal computer operations.

During the startup process, the computer's BIOS (Basic Input/Output System) firmware is stored in ROM. The BIOS contains essential instructions for the computer to initialize hardware components, perform self-tests, and load the operating system into memory. The ROM retains this information even when the computer is powered off.

On the other hand, UNIX is an operating system, not a specific type of memory. System files and configurations are typically stored on different storage devices or storage mediums, not specifically within the memory.

RAM (Random Access Memory) is a volatile memory that is used by the computer to temporarily store data and program instructions during its operation, but it does not hold the startup instructions for the OS.

To learn more about “memory” refer to the https://brainly.com/question/30466519

#SPJ11

who is he can anyone help me​

who is he can anyone help me

Answers

This person is Elon Musk, the owner of Tesla :)
The person in the photo is Elon Musk. He’s the CEO of SpaceX and CEO and product architect of Tesla, Inc.,founder of The Boring Company, co-founder of Neuralink, and co-founder and initial co-chairman of OpenAI.

To reduce costs and the environmental impact of commuting, your company decides to close a number of offices and to provide support for staff to work from home. However, the senior management who introduce the policy are unaware that software is developed using Scrum. Explain how you could use technology to support Scrum in a distributed environment to make this possible. What problems are you likely to encounter using this approach

Answers

Answer:

The description including its query is provided throughout the section of the elaboration elsewhere here.

Explanation:

Coordination between teams is the main challenge that this new strategy can make. Agile creation is focused on the teamwork of cross-functional teams, where every other mission is identified and distinct teams are formed. All the departments collaborate and afterward work in stages until the completion of this research project.Unless the organization shuts several departments, contact with various teams and peers will be disrupted and contact differences with workers as well as the team would be established. The best approach will be to provide regular communication calls with multiple project managers such that each project stage is synchronized. In turn, this same project coordinator should always have numerous calls with his group members to even get construction progress.
Other Questions
Round 62 3/4 to the nearest actual number. The owner of Michaels Prints - a firm that prints business cards- tells you about his new business. The owner wants you to calculate the anticipated efficiency of its business. The business has one pr qoura erased anime: was gaku yashiro a good or a bad guy and what were the motivations behind his actions? This is the first chapter of a story I wrote, pls leave any feedback. I have more on a site called wattpad so if you like it my username is The_Hawaiian_Sloth Find the solution to the system of equations. Write the solution as an ordered pair. 3x-2y=-94x+3y=22 Complete an analysis of the image A student eats a dinner rated as 2000 calories. He wishes to do an equivalent amount of work in the gymnasium by lifting a 50 kg mass. How many times must he raise the weight to expend this much energy? Assume he raised the weight a distance 2 m each time and that no work is done when the weight is dropped to the floor. 1 food calorie = 10 ^ 3 * cal 1cal = 4.186 Taylor Interior Designs declared Chapter 7 bankruptcy on February 1, 2019. Taylor has the following debts: Calculate the error in the ammeter which reads 3.25 A inacircuit having a series standard resistance of 0.01, thepotential difference measured across this standard resistance being0.035V.Answer a nurse is administering sucralfate to a client who has a gastric ulcerwhich of the following actions should the nurse take Stimulation of the beta receptors on heart muscle results in:________ It is emphatically the province and duty of the Judicial Department to say what the law is.John Marshall, Marbury v. Madison, opinion of the courtUse the quote to answer the question.What argument was the author of this statement, John Marshall, making about how the federal government should function? A. The judicial branch of the federal government should have the power to make laws. B. The judicial branch of the federal government should have power to interpret laws. C. The judicial branch has the sole authority to establish a federal court system. D. Only the laws created by the federal government, and approved by the court, have any authority in the federal system. The relief in which of the following regions is similar to that found in mountain ranges on the continents?_____A) ShorelineB) Continental shelfC) Abyssal plainD) Continental slopeE) Continental rise Find the magnitude of the vector (4,9).Write your answer in simplified radical form. What is the primary result of a fissionreaction?(1) conversion of mass to energy(2) conversion of energy to mass(3) binding together of two heavy nuclei(4) binding together of two light nuclei 1. What foreignterritories bordered theLouisiana Purchase? Use the point-slope form, y - y1 = m(x - x1), to find the linear equation of a line that passes through the points(2, -1) and (10, 7). what does y=what does x= Grace is lifting weights in rapid repetitions until her muscles get tired. What is she building? ______ describes the seated dentist and chairside assistant working as an efficient team.Select one:a. Single-handed dentistryb. Two-handed dentistryc. Four-handed dentistryd. Shared responsibility Round 67,891 to the nearest hundred