How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how that information is shared?
Answer:
this is more of an opinion question regarding what you personally do
Answer:
i mean the givens like age sex general location
A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines. ...- x-x
I stg I can't think of a good answer- x-x
Answer:
1. Make sure they are not overwhelming
2.Maintain the same style of transitions throughout the presentation
3. Keep it down to one animation/video per every 5 slides
4. Focus on the quality of the information rather than the way it is presented
Explanation:
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
Explain the difference between SLR cameras’ and point-and-shoot cameras’ viewfinders. Which viewfinder do you think would be easier to use? Why?
Answer: A point-and-shoot digital camera estimates the light that will reach the sensor on an LCD screen. A SLR camera is a single lens reflex camera. As an SLR camera has a reflex mirror, it allows you to see through the viewfinder the real image that the film will see.
Explanation:
Optical viewfinders show you a true image. Which means that there's no lag; you're simply looking at a scene through a lens. Cameras using electronic viewfinders, on the other hand, have to convert the light into a digital image and then display it via the EVF. And that can take time, which manifests as viewfinder lag.
Marco is writing a program in which the users will be told that they cannot enter the castle if they do not have 50 armor points. Which of the following lines of code would do that?
A.
if armor > 50:
print(“You cannot enter the castle!”)
B.
if armor = 50:
print(“You cannot enter the castle!”)
C.
if armor == armor:
print(“You cannot enter the castle!”)
D.
if armor < 50:
print(“You cannot enter the castle!”)
Answer:
D
Explanation:
the sign “<“ means the mouth would eat the bigger one. When you put it in it will allow you to go in the castle if you have MORE then 50
I hope it correct and it helps!
Answer:
d
Explanation:
the sign “<“ means the item on the left side is smaller than the item on the right.
NO LINKS!! HELP!! ESSAY DUE TODAY!!!
Answer:
To the "Am not 13"
Explanation:
Amy Bernstein wrote a story, which is titled "I'm Not Thirteen Yet." The story is told from the perspective of one of the characters, making it a personal narrative. The story's author describes his personal experiences throughout the narrative. 'I had entered the world of teenagers, and I wasn't even one of them yet,' says the author, demonstrating that he is writing about his own experiences.
i) State the two types of storage media.
ii) Give three important features of storage media.
iii) State two ways to protect storage media.
Please no links and false answers.
If you see that your bank account has had some money taken out that you did not authorize, which of the following is one action you can take to defend yourself?
A. File a police report.
B. Add more money to the back account.
C. Try to contact the person you think took your money.
D. Leave the bank account open to see if more money is taken.
what is bigger that terbites
Answer:
Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.
Explanation:
Answer:
I think you mean terabyte so the answer would be a petabyte
Explanation:
There are more thing that are bigger than terabytes and petabytes too, here are a few of them. exabyte, zettabyte, and yottabyte
this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω
Answer:
just get banned by spamming random stuff
Explanation:
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
anyone wanna hop on 1v1.lol
party code : usfhb6
Answer:
thx for the points
Explanation:
Question 1(Multiple Choice Worth 5 points)
(03.01 MC)
Which line of code will only allow a non-decimal point to be stored in a variable?
candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)
Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?
Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)
Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?
float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)
Which function converts the user's input to a number without a decimal?
float()
int()
print()
string()
Answer:
b
Explanation:
it's not a c or d and now I have to make it 20 characters long so I will do this
pleas help and hury
_____ can be lost or stolen by cybercriminals. Select 2 options.
Computer devices
Portable devices
Antivirus software
Computer networks
Free WiFi
Answer:
It is D and A
Explanation:
What did improvements in computer interface mean for animation?
Designs would be printed in color.
More complex information could be input.
Sketchpad was no longer needed for programming.
Animation had to be very simple and straightforward.
Answer:
Designs will be printed in colour
how has social media changed my journalism looks like?
A. journalists use poor grammar online
B. journalist can be everyday people
C. Only journalists from major news stations report the news
D. Journalists can dress down while reporting the news
This is for a test, so I need to get answers fast.
Please help me
Answer d
Explanation:
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
(I made this up teehee) what anime is katski bakugo from
I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form seeing their screen and tabs ?
Answer:
just don't share your screen in the class or if your a teacher just call them out
Explanation:
3 different ways that ultrasonic sensors can be used in everyday life.
Answer:
Ultrasonic Sensors Uses:
Anti-Collision DetectionPeople DetectionContouring or ProfilingPresence DetectionBox Sorting using a Multi-Transducer SystemEasy Control of Trash Collection VehiclesPallet Detection with ForkliftsBottle Counting on Drink Filling MachinesLearn more about Ultrasonic Sensors here
Visit —
https://brainly.in/question/19907919
https://brainly.ph/question/13809853
Hope my answer helps you ✌️
Mark BRAINLIEST
Why isn't my brainly post being answered?
Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.
What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware
Answer:
Hardware
Explanation:
Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.
Hope this helps. <3
Hardware is the name given to the parts of a computer that you can actually touch.
What is Hardware?
The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.
Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.
Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.
Therefore, Hardware is the name given to the parts of a computer that you can actually touch.
To learn more about Hardware, refer to the link:
https://brainly.com/question/15232088
#SPJ5
Vocabulary and Bridge Information
Directions: Do NOT use bullet points or copy and paste definitions. Put them in YOUR words.
Once you have completed the vocabulary, answer the following discussion questions. In complete sentences.
VOCABULARY
Bridge 16. Beam
Ingenuity 17. Girder
Architecture 18. Abutment
Engineer 19. Truss
Level 20. Anchorage
Protractor 21. Deck
Arch 22. Mortar
Structure 23. Pile Driver
Engineering 24. Suspension Cable
Innovation 25. Rivet
Force
Physics
Prototype
Tension
Compression
DISCUSSION: Research the following bridge disasters and tell me the following: Who built/designed the bridge, what happened and when it happened. Answer in complete sentences.
Iron Bridge
London Bridge
Dee Bridge
Tacoma Narrows Bridge
Point Pleasant Bridge
I NEED IT NOWW
what task does a sensor perform in a closed loop feedback system a: measures the variable that represents the system state B: compares the variable to a reference variable C: defines the reference variable D: feeds d at a back into the system so that it can reach the desired state
Answer: the answer ur looking for is option : a
Answer:
a: measures the variable that represents the system state
Explanation:
A large company has extensive downtown office space with many conference rooms. To lower their electric bill, the company has installed a new system that automatically turns off the heat and lights in a conference room when no one is in the room. What is the simplest explanation for how the system works?
A camera in each room is connected to the security desk. When the officer on duty sees that a room is empty, they turn off the heat and lights in that room.
A small robotic device on wheels knows the building layout. It roams the offices, peeking into each conference room to see if anyone is using it. If not, the robot turns off the lights and heat.
A sensor detects and reports on movement in the room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.
Every hour, the system emits a loud sound in each room. Pressing a large red button in the middle of the table turns off the sound in that room. If nobody does so within 30 seconds, the system turns off the heat and lights.
The simplest explanation for how the system works is option C: a sensor detects and reports on movement in the conference room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.
What is the office space about?The system that automatically turns off the heat and lights in a conference room when no one is in the room is commonly referred to as an occupancy sensor. An occupancy sensor uses various technologies, such as infrared or ultrasonic, to detect the presence or absence of people in a room.
Therefore, Once the sensor detects that no one is in the conference room, it sends a signal to the control system, which then turns off the heat and lights. When someone enters the room again, the sensor detects their presence and sends a signal to turn the heat and lights back on. This system is designed to save energy by ensuring that heating and lighting are only used when needed.
Learn more about office space from
https://brainly.com/question/28885269
#SPJ1
How to revise ICT offline?
Answer:
get your note and read over again
Explanation:
your note contains stuff you read from online and different materials . there are sometimes the brain doesn't want to read anything on the screen , just get your note go to a nice calm place and visualize things
Answer:
Open it and revise it :/ just edit it
Explanation:
PLEASE HELP!!! What is one game you think would be hard for computers to play? (AI)
Answer:
I would say the game "Go" because it requires intuition to play.
Explanation:
Answer:
I dont play much games but probaly a game you need to think outside of the box for
Explanation:
robots arent creative
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer