WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?

Answers

Answer 1

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:


Related Questions

Which of the following is true of functions? * 2 points A. Programs written with functions run more quickly B. Functions can help remove repeated code from a program C. Replacing repeated code with a function will reduce the number of commands the computer needs to run D. Functions are called once but can be declared many times

Answers

Answer:

I’m sure if I remember that this is “B.”

Explanation:

I have taken computer science class before so I remembered!

The option that is true of functions is B. Functions can help remove repeated code from a program.

It should be noted that the fact that programs are written with functions doesn't mean that they will run quickly.

Functions can help remove repeated code from a program. Also, replacing repeated code with a function doesn't reduce the number of commands the computer needs to run.

Read related link on:

https://brainly.com/question/17691320

Help pweeze this is due today :(

I will give u brainliest just pweeze, I need this answer :(

Answers

Answer:

just go in a website and see why important to them

Explanation:

and why the share with more people

Which of the following statements best compares and contrasts the role of editors in a television news room and editors at a newspaper?

a.) Both television and print editors work to ensure the quality of production; however, television editors must have a background in film media.
b.) Both television and print editors must make sure content is accurate and appropriate; however, print editors must also consider the length of the content.
c.) Both television and print editors must make sure their sources are reliable; however, fewer people read print news, so fewer would know if a print editor makes a mistake.
d.) Both television and print editors work under tight deadlines, which cause a great deal of stress; however, print editors finish their work sooner than television editors.
Need this now please, thank you!!!!

Answers

Answer: It is A

Explanation:

How do commands inside an onEvent run different from commands outside?

Answers

Answer:

This is probably the most important reason. In an event-driven architecture, there can be no question that an event raised represents something that has happened.

Now, because Commands are something we want to happen, and Events are something that has happened, we should be using different verbs when we name these things. This drives separate representations.

please respond not with answer but with comment.

Answers

Answer:.I used to play it but now I don’t;—;

Explanation:

HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT

Answers

Answer:

Explanation:

It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation.  Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.

plz mark as brainliest

What are the three phases of an iterative development process?
A.
design, analyze, generate
B.
plan, analyze, evaluate
C.
analyze, implement, delivery
D.
design, prototype, evaluate

Answers

Answer: D.  - design, prototype, evaluate

Explanation: Took a Edmentum/Plato Quiz

Answer:

D - Design, Prototype, Evaluate

Explanation:

PLATO

Choose the term that describes each step of the cycle.

------- : gets next instruction

---------- : interprets instruction

----------- : carries out instruction

------------ : saves result of instruction

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

Answer:

A). Fetch : gets next instruction

B). Decode : interprets instruction

C). Execute : carries out instruction

D). Store : saves result of instruction

Explanation:

I just did the Test on EDGE2020 and it's 200% correct!  

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)  :)

Computer identity theft differs from theft in the real world in what major way?
A. Identity theft puts you in more physical danger.
B. Identity theft can affect your credit without your knowledge.
C. The banks will not assume your losses due to fraud.
D. Banks will replace your credit cards more quickly with identity
theft.

Answers

Computer identity theft is different from theft in the real world because B. Identity theft can affect your credit without your knowledge.

Computer identity theft simply means the use of someone's else private information by another person. It should be noted that identity thieves usually apply for loans by using an individual's credit card.

Computer identity theft is different from theft in the real world because identity theft can affect your credit without your knowledge. Identify thieves can also open bank accounts and use the credit cards in other people's names.

Learn more about theft on:

https://brainly.com/question/20609642

Answer:

B. Identity theft can affect your credit without your knowledge.

Explanation:

What are the lines of communication on a motherboard?

Answers

Answer:

buslines

Explanation:

hybfndndndjdkd

After adding an image to her flyer, Danica played around to see which layout would look the best. At one point, her text was on top of her image. Which features can Danica use to fix the issue? Check all that apply. Position feature Wrap text feature Picture dialog box Insert tab Picture tools

Answers

Answer:

Position feature

Wrap text feature

Picture tools

Explanation:

Answer:

A.) Position Feature

B.)Wrap text feature

E.)Picture tools

Explanation:

write the seven tasks of previntng maintenance?​

Answers

Answer:

These are testing, servicing, calibration, inspection, adjustment, alignment and installation. Every maintenance team member should be conversant with and apply them accordingly. A preventive maintenance is a crucial component of every company's TPM program.

It means fruit- trees garden.

Answers

Answer:

What does?

Explanation:

Do you have a question?

Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces

Answers

Answer:

The correct option is C) Use a single three-legged firewall with three interfaces

Explanation:

DMZ is an acronym for a demilitarized zone.

A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.

The interfaces you'd get with the DMZ network are

A public network (Internet Protocol-IP) address  with a public interfaceAn internal network interface with a private network (IP) address  A DMZ interface with a public network (IP) address  

Unlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.

Cheers!

HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?

Answers

Leave the room and let someone else figure it out!

HURRY IM TIMED the ability for search engines to return search results in relevancy ranking in an evolving capability true or false

Answers

Answer:

The answer is True

Explanation:

I took the quiz and got it right.

When you are brainstorming, what should you be careful to avoid?
A. Editing your ideas as you go
B. Setting boundaries for your session
C. Writing down all your ideas D. Setting a time limit for your session

Answers

It's most likely B. Setting boundaries for your session

reason: Brainstorming is supposed to be coming up with q bunch of creative ideas. setting to many boundaries may make it harder to come up with new stuff.

You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Which of the following can you drag on your spreadsheet to do this?

Answers

How can you insert a new row into your data without disturbing an adjacent set of data on the same sheet? Highlight only the data where you'd like to insert a row. Right-click > Insert > Shift cells down.

i need help with the rest also

Answers

Answer:

??? blackkkkkkkkkkkkkkkkk

Question # 6 Fill in the Blank You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. You are testing your username program again for a user whose name is Paula Mano. The output should be

Answers

Its PuaMano

Explanation:

got it wrong and it shows this answer for edge

Which of the following statements are true regarding Moore’s Law?
states that storage capabilities will triple every two years

is a purely abstract concept that does not clearly apply to the computing industry

was described by Gordon Moore in the early 2000s to predict growth in the fiber optic industry

relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The question is about Moore's Law.

The given options in this question are:

states that storage capabilities will triple every two years is a purely abstract concept that does not clearly apply to the computing industry was described by Gordon Moore in the early 2000s to predict growth in the fiber optic industry relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965

The correct option to this question is 4. i.e:

Moore's Law related to increases in the processing power of computers and has been quite accurate since it was introduced in 1965. This law was based on a prediction and made by American engineer Gordon Moore in 1965. And it states that the number of transistors per silicon chip doubles every year.

While the other options are not correct because:

It does not state the storage capabilities that will triple every two years, but this law state that computing power and transistors on chips become double every year. It is not a purely abstract concept but it is applied in computing and this law become more famous due to its value. This law was presented in 1965.

Answer:DExplanation:

relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965

Which entity might hire a Computer Systems Analyst to help it catch criminals?

a law enforcement agency controlled by the government
a private investigator who used to work for the government
a credit card company that does business with the government
a financial management firm with ties to the government

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is:

A law enforcement agency controlled by the government might hire a Computer System Analyst to help it catch criminals.

Because only law enforcement agency that is under control of government allows in any country to catch criminals. So, in this context the first option is correct.

While other options are not correct because:

A private investigator who used to work for the government does not need the services of a computer system analyst, because he may be assigned only one assignment. And, his purpose is to perform duty and complete the assignment. A credit company also does not allow the Government in any country to catch the criminal. A financial management firm also not allowed to catch the criminal, so in this context, only a law enforcement agency controlled by the government is allowed to catch the criminal. So, the first option of this question "a law enforcement agency controlled by the government" is correct.

Answer:

A

Explanation:

8.6 Code Practice: Question 1
Write a function named buildArray that builds an array by appending a given number of random two-digit integers (10-99). It should accept two parameters — the first parameter is the array, and the second is an integer for how many random values to add, which should be input by the user.

Print the array after calling buildArray

Answers

In python 3.8:

import random

def buildArray(arr, nums):

   i = 0

   while i < nums:

       arr.append(random.randint(10,99))

       i+=1

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

I hope this helps!

The function named buildArray that builds an array by appending a given number of random two-digit integers (10-99) and accept 2 parameters is represented below

import random  

def buildArray(array, integer):

   i = 0

   while i < integer:

       array.append(random.randint(10, 99))

       i += 1

   return array

print(buildArray([], 12))

The code is written in python.

A function is declared called buildArray. This function accept 2 parameters which are arrays and integer.

i is use to declare a variable assigned to zero.

while i is less than the integer(one of the parameter), random number between 10 and 99 is appended to the parameter array.

The value of i keeps on increasing until it becomes less than the integer.

The filled array is returned.

Finally, we call the function with the required parameters.

The bolded portion of the code are keywords in python.  

read more: https://brainly.com/question/18612252?referrer=searchResults

why is it when you put earbud aux cords in a phone or computer they sound weird until you move the aux cord? Then it is somehow clear. Why?

Answers

Answer:

that might just be the headphone cord itself or it might be the port on the pc/phone

Explanation:

i had this happen with my old droid razr hd i thought it was the aux cord on my speaker and head phones but i used the same things on a friends phone and they worked just fine and this might be do to an old  or broken port on the phone /c my phone headphone port got used almost everyday and it was just the port you can replace this on some tech or you could just use bluetooth if the tech doesent have it buy and adapter.

            hope this helps!!!

What is the output?
>>> phrase = "hello mom"
>>> phrase upper()

Answers

Answer:

The iutput would be nithing since nothing is printed out, how ever, the output of

>>> phrase = "hello mom"

>>> print(phrase.upper())

would be "HELLO MOM".

You would get the same results from this code,

>>> phrase = "hello mom"

>>> phrase = phrase.upper()

>>> print(phrase)

Answer:

The answer is HELLO MOM

Explanation:

I hope this helps, have a wonderful day!

Select the correct answer. Which option correctly describes a DBMS application? A. software used to manage databases B. software used to organize files and folders C. software used to develop specialized images D. software used to create effective presentations

Answers

Answer:

oftware used to manage databases

Explanation:

Answer:

A. software used to manage databases

Explanation:

This is correct on plato

Identify the parts of a spreadsheet by using the drop-down menus to select the part that corresponds to the labeled diagram to the right.

A

B

C

D

E

Answers

I believe d is the answer !

Answer:

A- Row

B- Column

C- Workbook

D- Cell

E- Sheet

Explanation:

Got a 100% on this, the person above is incorrect.

Someone help its about LA Doña 2

so basically I just wanted to know who has seen it all and where i can watch it

Answers

Answer:

If you look on Just watch it will show you the different people that currently have it right now it is sadly not on Netflix from what I could find out but it will probably be added later on.

Explanation:

Netflix sometimes takes its time adding shows which is sad but that is just how they work. I would recommend maybe trying it on a website that Just watch list or just buy the disc from eBay. either way, I wish you luck!

A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet

Answers

ermano envia foto de lo que necesitas yo te ayudo

Which precaution should you take while working on a computer

Answers

Answer: Maintain a cool temperature to avoid sweating

Explanation:

Other Questions
the sunshine Club collected 524 cans for a canned food drive. the cans were then split up equally into 8 boxes. Part A how many can were in each box? Part B how many can were left over after the boxes were filled? Helppp plzz!! A.) Side - Side - SideB.) Side - Angle - SideC.) Angle - Side - AngleD.) Angle - Angle - SideE.) Hypotenuse - LegF.) Not enough information. my picture please hahahahahahah Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles.Tension between the two sides escalated until June 1948, when the Soviets blocked all western access to the capital. In this first real crisis of the Cold War, the West was not going to be denied by the Soviets.If the underlined word were replaced with the word "event, the tone of the excerpt would bemore resentful.more intellectual.less intense.less objective. how might have the oppressive British rule influenced the ideas of the articles of confederation ? A collection of the same kind of cells working together to do the same job HELP PLEASE ASAP Read the excerpt from "On Becoming an Inventor" by Dean Kamen.When I was twelve years old and Barton, my older brother, was around fifteen, we took over the family basement. At first, I made a darkroom for developing pictures, and Bart was using it as his lab where he was raising about one hundred white rats, removing their thymus glands, and trying to figure out the glands' dysfunction. He wanted pictures taken of his experiment, doing the surgery on rats, and since I already had a darkroom, I took the pictures, though somewhat reluctantly. I didn't like the blood.What can you conclude about Barton from the excerpt?He was interested in solving medical mysteries at a rather early age.He did not understand why Dean would be squeamish about the blood.He went on to become a very famous and successful doctor.He had a severe dislike for rats and all other kinds of rodents. find the slope of the line passing through the points (-5,5) and (-5,-8) What is the unit rate of 232 people in 8 classrooms? i need help with this pleasee five men build a wall in 10 days how long will it take 10 men Anchara drops a penny from a height of 60 feet above the ground. The equation h=-16t^2 + 60 models the penbys height h i feet as a function of time t in seconds whatvare the solutions P3- is a(n) ______________________, so it ________________ valence electrons. Group of answ er choices anion, gained cation, gained cation, lost anion, lost The following DNA is being replicated and the origin of replication is in the middle of the sequence and marked with three stars ***. 5'ATCGGGCTACCCATGAAATGCTAGCATT***TAAGATCTTAAGCTAGCTAGTTCGATCTGA3'What is the sequence of the primer for the LEADING strand? Your answer should be 8 nucleotides long, written from 5' to 3' and only include the nucleic acid sequence (ex: ACTACTAC).note: there are two answers for this question A farmer's market is selling peaches for $2.00 a pound. If you buy 2 pounds, you save 10% on each pound. How much does it cost to get 2 pounds of peaches? 1. What right do education encompasses both entitlements and freedom?A. Right to free and compulsory primary educationB. Right the quality education in private schoolC. Right to choose yourteachersD. All of the above2. Which of the following is an example of non-formal education?A. Primary schoolingB. Senior high schoolC. Adult night classesD. Doctorate program El libro. _____ Libros. Approximately how many people are likely trafficked into the United States each year?5,5008,5008,50011,50011,500-14,500O 14,50017,500 She dove 75 feet under the sea To be eligible for Bright Futures, you must submit a statement explaining how all money will be repaid submit a plan of action for all courses throughout college take at least three remedial credits in the first semester take at least six non-remedial credits per semesterplease only answer if you know what your talking aboutand if your right i will give brainiest.