Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D. malicious and software Answer: ________

Answers

Answer 1

Answer:

D. Malicious and software


Related Questions

Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is processed

Answers

Answer:

The stored procedures in DBMS can be executed with;

EXEC procedure_name

It can also be executed with single or multiple arguments with

EXEC procedure_name (use the at tag here)Address= data1, (use the at tag here)Address= data2;

It returns a status value of the queried table.

Explanation:

A stored procedure is a subroutine used in SQL servers to perform a task on a table in a database or the database itself. The syntax for creating a stored procedure is;

CREATE PROCEDURE procedure_name

And then, other statements can be written to be executed when the procedure is called.

1. It is acceptable to use a jack that has been
A) O Dropped
B) O Cracked
C) Distorted
D) None of the above

Answers

D. None of the above

Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when many developers may be working on the same code. Support your answer with an appropriate visual that you find from the internet.

Answers

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

Write a second ConvertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches.

Answers

Answer:

Answered in C++

double ConvertToInches(double numFeet, double numInches){

   return numFeet*12 + numInches;

}

Explanation:

A foot is equivalent to 12 inches. So, the function converts feet to inches by multiplying the number of feet by 12.

The question is answered in C++

This line defines the method with two parameters

double ConvertToInches(double numFeet, double numInches){

This line converts the input parameters to inches and returns the number of inches

   return numFeet*12 + numInches;

}

To convert 9 feet and 12 inches to inches, the main method of the program can be:

int main(){

   cout<<ConvertToInches(9,12);

   return 0;

}

This above will return 120 because: 9 * 12 + 12 = 120 inches

Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.

Answers

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)

Explanation:

Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.

The use of  integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.

A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.

Learn more about electronic devices from

https://brainly.com/question/11314884

Question #3
Multiple Choice
Which statement is true?
O A collection is a type of deque.
O A list is a type of deque.
O A deque is a type of list.
O Adeque is a type of collection.

Answers

A deque is a type of list

Answer:

D. A deque i a type of collection

Explanation:

I do computer science too ;3

Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.

Answers

what are the options ???????????

Answer:

all of them but B

Explanation:

Correct on edge

Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft

Answers

Answer: appendleft

Explanation: Edge 2021

The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.

What is an information?

An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.

The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.

Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.

Learn more about information here:

brainly.com/question/27798920

#SPJ5

Files can be stored on hard drives, network drives, or external drives, but not in the cloud.
True
False

Folders provide a method for organizing files.
True
False

Answers

The first one is false and the second is true

Answer: (1) False, (2) True

Explanation:

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g

Answers

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

As an interviewer, it is not necessary to be at eye level with interviewee

True
False

Answers

Answer:

True

Explanation:

Have a great day

Answer:

True

Hope this helps

Write a simplified machine language program that has register $s0 loop through the numbers 0, 100, 200, ..., 500. See Lab 11 for details on submitting the simplified machine language programs.

Answers

Answer:

Explanation:

     li $s4 , 100 // Initialize register $s4 with 500 for checking the condition when $s0 is equal to 500

Loop : li $s0 , 0 // Initialize register $s0 with0

abc : addi $s0 , 100  // Add 100 to register $s0

bne $s0, $s4 , abc  // Branch to label abc if not equal to 500

beq $s0, $s4 , Loop   // Branch to label Loop if equal to 500

please help add header file
/**
* TODO add header file
*/
public static boolean comp(int[][] b, int z, Random rand) {
int x = findWinningMove(b, z);
if(x != -1) {
dropToken(x, b, z);
return true;
}
x = findWinningMove(b, (z + 1) % 2);
if(x != -1) {
dropToken(x, b, z);
return false;
}
do {
x = rand.nextInt(BOARD_WIDTH);
} while(b[BOARD_HEIGHT - 1][x] != -1);
dropToken(x, b, z);
return false;
}

Answers

Answer:

jhgfycgxbhyjuufdxxcgbhjkml;,,,,,,,,,,,,,dfxcg,m .u9cgfbv nmkojihuygfc bvnjmkouhytfgvhbjfjfhngouuhjfcjbhbgfbjghbhjigjkijfbjfjigfijgfg

Explanation:

What are url addresses for visiting websites? And what are the different parts of a URL? Answer it in a 1-2 paragraph

Answers

A URL is a website link which consists of //https and the title of the website you are going to. A URL helps guide and memorize certain links and websites. Also some URL links are fake and give false advertisement or false information especially when looking into things that happen everyday like the news. You can tell this by seeing if the url link is a trustworthy link. I hope this helps maybe you can expand on it if it’s not long enough

Answer:

Please read explanation

Explanation:

URL is the short form for "Uniform Resource Locator". A uniform resource locator tells the location of a website to the browser.

Parts of URL:

There are three main parts of URL

ProtocolDomain nameExtension

Protocol defines the type of protocol used for communicating with the website while the domain name is the name assigned to the IP address and the mapping is stored in domain name server and extension tells the type of website i.e.

.com means commercial

.org means non-profitable organization

.edu means educational website

An additional element is path which change with the website navigation.

Becky's mom is a nurse and is required to wear specific clothing to work. This clothing is called

a uniform
business casual
casual
formal business attire

Answers

the answer is uniform!

hope this helps!!

What kind of number is 36A

Answers

Rational
or compound what form are you looking for?

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.

Write a loop to print all elements in hourly_temperature. Separate elements with a -> surrounded by spaces. Sample output for the given program: (must be in python)
90 -> 92 -> 94 -> 95
Note: There is a space after 95.
------------------------------------------------------------------------------------------------------------------------
hourly_temperature = [90, 92, 94, 95]
for temp in hourly_temperature:
for index,temp in enumerate(str(temp)):
if index != len(temp)-1:
print(temp,'->',end=' ')
else:
print(temp, end='')
print('') # print newline
------------------------------------------------------------------------------------------------------------------------
My expected out is:
90 -> 92 -> 94 -> 95
I keep getting:
90 -> 92 -> 94 -> 95 ->
NOTE: I can't edit the last line "print('') #print newline"

Answers

Answer:

Following are the code to this question:

hourly_temperature = [90, 92, 94, 95]#defining a list that holds values

c= 0#defining a variable c

for temp in hourly_temperature:#defining a for loop to count list values

   c+= 1#defining c variable to increment the value of c

   for index,temp1 in enumerate(str(temp)):#defining for loop for spacing the list value

       if index == len(str(temp))-1 and c!= len(hourly_temperature):#defining if block that checks the length of list

           print(temp1,'->',end=' ')#print value

       elif c == len(hourly_temperature) and index == len(str(temp)) - 1:#defining elif block that checks the length of list

           print(temp1, end=' ')#print value

       else:#defining else block

           print(temp1, end='')#print value

Output:

90 -> 92 -> 94 -> 95  

Explanation:

In the above-given code, a list "hourly_temperature" is declared, in which an integer variable c is declared, that holds an integer value that is equal to 0, and two for loop is declared, and in the first loop is used for count list value, and inside the for loop is uses enumerate method to assigns an index for each item and use the conditional statement to check each list value and provide space in each element value.

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

If you wanted to make the system sequentially consistent, what are the key constrains you need to impose

Answers

Answer:

The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.

Explanation:

Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.

This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.

what is one issue when organizing around hierarchical functions

Answers

Answer:

The one issue that arises when organizing around hierarchical functions is the dilution of information caused by the absence of direct communication with the overall boss.

Explanation:

This problem is more pronounced when it takes an organization a longer time before initiating hierarchical functions.  Employees who have grown used to communicating directly with their bosses will now be distanced from them because direct reports to the overall bosses are no longer permitted.  Instead, each functional head is expected to coordinate their group information, have it thoroughly filtered before allowing the overall boss to access it.  One advantage is that functional hierarchies eliminate information overflow.  Unfortunately, some bosses do not feel comfortable, at first, when their organizations commence hierarchical organization of business functions.

In Python, programmers use square brackets and an index range to slice multiple characters from a string.


True

False

Answers

(True) jgjgjgbfbfbfbdvdvdvdv

Answer:

True

Explanation:

You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a description, and possibly a choice1 and a choice 2. You will need to implement the __str__ override to output the state of the room. You should also implement a method called game_over. If the room does have a choice 1 and choice2 then the game is over and it should return True.

Answers

Answer:

class Home(object):

   def __int__(self):

       room1()

  # room1 is the bedroom, you could either sleep or leave the room

   def room1(self):

       print("Room 1")

       choices = ['sleep', 'leave']

       for _ in iter(list, 0):

           mychoice = input("What do you want to do here sleep/leave: ")

           if mychoice == choice[0]:

               print("You are sleeping")

           elif mychoice == choice[1]:

               self. room2()

           else:

               self. game_over()

   # room2 is the living room for fun and recreation

   def room2(self):

       print("Room 2")

       choices = ['watch a movie', 'dance', 'call a friend', 'leave']

       mychoice = input("What do you want to do here: ")

       for _ in iter(list,0):

           if mychoice == choice[0]:

               print("I love this movie")

           elif mychoice == choice[1]:

               print("You are a good dancer.")

           elif mychoice == choice[2]:

               self. room1()

           else:

               self. game_over()

   # this method ends the program

   def game_over(self):

       quit()

Explanation:

The simple python object oriented program defines class with three methods room1, room2 and game_over which are all linked from the __init__ method from where the room1 is call first.

list any three importance of computer​

Answers

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

what does "route print" do?

Answers

Answer:Route is a Windows command that displays and updates the network routing table. These activities will show you how to use the route command to display the local routing table.

Explanation:

A switch is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. True False

Answers

Answer:

True

Explanation:

A network switch is also called switching hub or a bridging hub. It is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. It makes use of Mac addresses in the forwarding of the data link layer (layer 2) of the OSI model. Types include managed switches, unmanaged switches, smart switches but to mention a few.

________________ are piece of programs or scripts that allow hackers to take control over any system.

Answers

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.


how to play here!!!!!!!!!!!​

Answers

Answer:

what?

Explanation:

whaaattt????????????

Answer:

Choose a platform: Playing video games no longer requires a deicated console or a gaming computer

Explanation:

what is meant by resources of computer

Answers

This question is not specific enough. However, a computer helps you listen to music, read articles and even novels, draw using online platforms, play games, etc.

1) Write a command line that recursively copy the directories and files inside /etc to your home directory. g

Answers

Answer:

cp -R /etc /home

Explanation:

The command statement above is a Linux command line statement used to copy the directories and subdirectories of the /etc folder.

The 'cp' command is used to conventionally copy files and folders but with the '-R' flag, the specified folder is copied recursively. To copy a folder to another recursively, use the syntax;

cp -R <source folder> <destination folder>

Other Questions
What drives plate movement? the geography of greece led to the growth of independent political units, almost like countries, which are known asa- mercenariesb- city statesc- empiresd- oracles Write your own sentences using the following words( one word per sentence for a total of 8 sentences). Peril- Credulity- Condole- Prosaic- Grimace- Compensation- Fate- Resignation Question 3What is the meaning of the word enchanted as it is used in the following sentence:When she first spotted the English settlers, Pocahontas was enchanted by their foreign ways.Enchanted implies that Pocahontas was captivated by the English.BEnchanted implies that Pocahontas was hypnotized by Captain Smith.Enchanted indicates that Pocahontas was disgusted by the English.DEnchanted indicates that Pocahontas thought the English ways wereridiculous. John has $5 in his bank account when he gets a job. He begins making $109 a day. A student found that the equation that represents this situation is y = 5x + 109. Qu'est-ce qu'on peut faire dans un jardin ? -14x + 18 - 11 -2x + 3 After he went to the doctor to get his prescription. Charlie also needed to visit his sister who was in town.What is the BEST way to combine the information above? A. After he went, to the doctor, to get his prescription, Charlie also needed to visit his sister who was in town. B. After he went to the doctor to get his prescription, Charlie also needed to visit his sister who was in town. C. After, he went to the doctor to get his prescription, Charlie also needed to visit his sister who was in town. D. After he went to the doctor, to get his prescription. Charlie also needed to visit his sister who was in town. How can collaboration influence anartistic renaissance?I A runner charted how long it took her to run certain distances here is the information she gathered we can look for ways to develop business clearly or we can clearly look for ways to develop business Put these over a common denominator: /5 and 4/7 name any three types of agriculture Which of the following substances is used for surgical hand scrubs? Is a vacuole prokaryotic or eukaryotic What is the slope of the line through the points (5,2) and (-3, -7). Simplify the expression. 49^3/2 Which expression is equivalent to (m^2-3m+7)(m-5)^-1 i need help ! please asap!!!! According to psychologist Martin Seligman, depression is largely a response to