______ is the software that protects your computer from harmful files, trojan horses, and worms.

Answers

Answer 1
The software that protects your computer is an antivirus
Answer 2

Answer:

Antiviruse

Explanation:

The software that protects your computer is an antivirus


Related Questions

The steps for creating a newsletter are to _____.

Answers

Puting your ideas together every write has to do that and also gather true information, and making a intering story for your readers.
Step 1: Figure out your newsletter's goal. ...Step 2: Gather your content. ...Step 3: Design your template. ...Step 4: Add in body content. ...Step 5: Add in personalization tokens and smart content. ...Step 6: Choose your subject line and sender name. ...Step 7: Tidy up loose strings.Step 8: make sure you're legally compliant and you can send it

Before entering a loop to compute a running total, the program should first do this

Answers

Initialize it's variable:

double total = 0.0
while( whatever )

(tco 8) when a file is opened in the append mode, the file pointer is positioned

Answers

at the end of the file, so that additional data is appended while the existing data stays intact.

How do you open two different picture in photoshop?

Answers

click "file" and click "open image" and that's your first image and do the same thing ;))))

To open two pictures in Photoshop, you can open them directly from Photoshop or right-click the images in a folder and select "Open with" Photoshop. Utilize the Photo Editor for comparing or editing images and remember to save edited versions under unique names. Photoshop's Illustrations group, Picture Styles, and Picture Tools are useful for editing and comparing images.

To open two different pictures in Photoshop, you can choose a couple of methods. One way is to launch Adobe Photoshop on your computer and open the images directly from the software. Alternatively, you can locate the photos you want to edit in a folder, right-click the image, select "Open with" and then Photoshop to load the images into the program. Once in Photoshop, you can use the Photo Editor to work on the images and even compare them side-by-side.

When editing, it's a good practice to save different versions of your photos under unique names (e.g., "dog_version_1.(format)") to ensure you don't lose the original files. While comparing images, you can use the slider feature to observe differences between the original and edited versions. If needed, you can make further edits or revert to the original images.

In an ipv4 packet header, what does the value in the internet header length bsignify?

Answers

The length of the IPv4 header

what ribbon contains the option to edit a font, including underlining.
a.home
b.insert
c.references
d.view

NEED HELP NOW

Answers

The ribbon is a graphical control element in the form of a set of toolbars, it is placed on several tabs and  helps users to use commands efficiently and directly. The option to edit a font, including underlining is part of the HOME ribbon.  (Solution: A)
The ribbon can be customized in order to contain the tabs you as a user need.

Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server is exactly the same as pop permits an e-mail message to remain stored on the mail server even after they have been read by a client computer?

Answers

Yes. A set of standards is how e-mails are to be processed between any mail servers. It corulates exactly the same as SMTP copies. Everything you send and or receive will always remain stored in a client's computer as well as the one the original e-mail was sent from. You can clear your Cookies and Cache if need be. Yet, ultimately it's always there.

No, these statements describe different aspects of email protocols:

1. A set of standards that define how email is to be processed between mail servers: This refers to email protocols such as SMTP (Simple Mail Transfer Protocol), which govern the transmission of email messages between mail servers.

2. SMTP copies an email message from the client computer's hard disk, deletes it from the client, and stores it on the mail server: This describes how SMTP works. It's responsible for sending outgoing mail from a client to a mail server. However, SMTP typically doesn't involve copying messages from the client's hard disk. Instead, it transfers the email message from the sender's client to the recipient's mail server.

3. POP permits an email message to remain stored on the mail server even after they have been read by a client computer: This describes the behavior of the POP (Post Office Protocol). POP allows email clients to retrieve messages from a mail server to the client's device. By default, POP removes the email from the server after it's been downloaded to the client, but some configurations of POP, like POP3 with the "Leave a copy of messages on the server" option enabled, can allow messages to remain on the server even after they've been retrieved.

So, while these statements touch on aspects of email protocols, they don't describe the exact same thing, and each statement refers to a different aspect of email communication and protocols.

Write a loop that sets new scores to old scores shifted once left, with element 0 copied to the end. ex: if old scores = {10, 20, 30, 40}, then newscores = {20, 30, 40, 10}.

Answers

For the given problem, define the size equal to 4 since four scores are given. Now, create two arrays: one for storing old score values and second for storing new score values. After this, assign old scores in an array and then create a loop that will shift the old score from second element until the one less than the size . Now, display the old scores and new scores as shown in output.

Further explanation:

Code:

The Java code to set the new scores from given old scores is as given below:

//Define the StudentScore class

public class StudentScores

{

//main method

public static void main(String[] args)

{

//Define final variable

final int SCORES_SIZE=4;

//Create two array

int[] oldScores = new int[SCORES_SIZE];

int[] newScores = new int[SCORES_SIZE];

//Declare a variable

int i = 0;

//Assign values to array

oldScores[0]=10;

oldScores[1]=20;

oldScores[2]=30;

oldScores[3]=40;

/*Your solution goes here*/

int firstOldScore=oldScores[0];

//Run for loop to shift the old score from second element until the one less than the size

for(int index=0;index<SCORES_SIZE-1;index++)

{

//shift oldScores to newScores

newScores[index]=oldScores[index+1];

}

newScores[SCORES_SIZE-1]=firstOldScore;

System.out.println("oldScores:");

for(i=0;i<SCORES_SIZE;++i)

{

// Display the oldScores

System.out.print(oldScores[i]+" ");

}

System.out.println();

// Print the new scores

System.out.println("newScores:");

for (i=0;i<SCORES_SIZE;++i)

{

//Display newScores

System.out.print(newScores[i] + " ");

}

System.out.println();

return;

}

}

Output:

oldScores:

10 20 30 40

newScores:

20 30 40 10

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

Answer details:

Grade: College Engineering

Subject: Computer Science

Chapter: Java Programming

Keyword:

Java, input, output, programming, statements,  char, int, variables, file, loop, old scores, new scores, array, size, variable, display

In an ipv4 packet header, what does the value in the internet header length signify? docslide

Answers

the length of the IPv4 header

When you examine a computer chip under a microscope, what will you see?

Answers

When you examine a computer chip under a microscope,  you will see integrated circuits.

When you right click a word with a red squiggly line under it, which of the following displays?

Answers

Final answer:

When you right click a word with a red squiggly line under it, a list of suggestions or options to correct the spelling or grammar mistake displays.

Explanation:

When you right click a word with a red squiggly line under it, the following displays: a list of suggestions or options to correct the spelling or grammar mistake.

For example, in Microsoft Word, when you right click a word with a red squiggly line, a context menu appears with suggestions such as 'Ignore All', 'Add to Dictionary', 'AutoCorrect', and a list of possible correct spellings.

This feature is helpful in identifying and correcting spelling or grammar errors in a document.

1 what is the osi security architecture

Answers

The osi security architecture focuses on security attacks, mechanisms, and services.


After creating the table, how would you add a new record to the table

Answers

Assuming you have a SQL database, you would use the SQL INSERT statement.

Which field in the ip header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

Answers

Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? The Answer  is = TTL

Define the depth versus the breadth issue in software complexity.

Answers

The breadth of a software complexity usually refers to the "number of" functionality, components, interfaces, etc. of the software while the depth of the software complexity refers to the "relations and interactions" among these functions, components, etc. 

Final answer:

The depth versus breadth issue in software complexity refers to the level of detail (depth) and range of functionalities and scenarios (breadth) addressed by the software. Depth involves the complexities and intricacies within the software, while breadth covers the diverse requirements and use cases it needs to satisfy.

Explanation:

The depth versus breadth issue in software complexity relates to two dimensions of understanding and addressing complex software. Depth refers to the intricacies and level of detail within the software itself, including the underlying algorithms, data structures, and the interdependencies between various parts of the software. It involves delving into the finer, more complex aspects and the implications these may have on the software's functionality, maintenance, and future development.

Breadth, on the other hand, deals with the extent and range of functionalities covered by the software, the different scenarios under which the software can operate, and the consideration of various user requirements and use cases. It encompasses understanding and addressing the diverse needs the software is supposed to fulfill and the various perspectives or contexts in which it can be applied. A broad approach ensures that the software performs well across a wide range of conditions and adequately satisfies the user base's needs.

In summary, when analyzing or developing software, it is crucial to strike a balance between depth, which provides detailed understanding and robustness, and breadth, which ensures flexibility and adaptability to a wide range of requirements.

Why is it important to match the latencies fo the older modules to the newer modules?

Answers

It is important to match the latencies of the older modules to the newer modules because it is a requirement when you upgrade the modules in your computer. If the result of matching is that they are not the same, it can cause the computer to run slow and not run properly.



Matching latencies in modules is essential to maintain system performance consistency, prevent synchronization issues, and ensure smooth data processing.

For the system to operate consistently and effectively, the latencies of older and newer modules must be matched. The time interval before a data transfer starts in response to a command is referred to as latency. Disparities in the latencies of several modules that are too great might cause synchronisation problems, system crashes, and inefficient data processing.

For example, in a computer network with several interacting modules, a greater latency module can cause the system as a whole to operate more slowly. This is especially crucial for systems that have modules delivered at several delivery sites and via both contact and distant modes. Mitigating these challenges is ensuring equivalency between the delivery of modules through various means.

Making small talk at a meeting is a bad idea because

Answers

It waste a tremendous amount of time
The term "small talk: is used to describe an informal talk and type of conversation about unimportant or uncontroversial matters most commonly used in some social gatherings. Meeting on the other hand is formal gathering that needs to follow predefined structure and where conclusions about some subject should be gained. This is the reason why small talk is bad idea at a meeting. 

Microsoft paint and adobe illustrator are examples of ____ software.

Answers

Microsoft Paint and Adobe Illustrator are examples of graphic design software.

Graphic design software is used to create, edit, and manage visual artwork and designs. Microsoft Paint is a simple raster graphics editor that has been included with all versions of Microsoft Windows. It provides users with basic tools for drawing, painting, and editing images. On the other hand, Adobe Illustrator is a sophisticated vector graphics editor used by professionals to create and manipulate vector-based illustrations. Unlike raster graphics, which are made up of pixels, vector graphics are composed of paths, which makes them scalable without loss of quality. Both types of software play a crucial role in fields such as digital art, user interface design, and web development. They allow users to exploit various tools, such as templates and grids, provided within the software to align and arrange graphical elements meticulously, enhancing the overall visual composition.

For a user to print, pause, resume, restart and cancel documents they sent to the printer, the user must have the basic _____ permission

Answers

The use must have the basic user permission as these functions do not require administrator permissions.

Write a C++ Program to read 2 grades from the keyboard ( Math and Physics ) .

Answers

cin is discouraged, so I'd go with:

string math, physics;
getline(cin, math);
getline(cin, physics);

of course, parsing needs to happen to verify that a correct grade was typed...

What has emerged as the most popular application of on-demand software (software-as-a-service)?

Answers

Transportation management systems (TMS)

A(n) ____ is the equivalent of a field in a file system.

Answers

An attribute is the equivalent of a field in a file system. That is what they call a field because it is a component of a file. In information technology, and relating to data files in particular, file systems use attributes to define their files and make them more specific and easily identified within a data system as a whole.
Final answer:

A field in a database is comparable to a file in a file system. Files are organized within a hierarchical file system structure and can be identified by their absolute paths.

Explanation:

A field in a database or spreadsheet is similar to a file in a file system. Just as a field is a basic unit of data storage, a file is the basic unit of storage in a file system. Files can store various types of data including documents, images, videos, and program executables. These files are organized within a hierarchical structure of directories.

For example, in a filesystem hierarchy, the root folder is at the top. Every file and directory can be identified by an absolute path, such as '/home/oneils/documents/todo_list.txt' in a Unix-like operating system or 'D:\books\ERP_Analysis_Book\Exercises\Chapter_2\1_N400_erp.erp' in a Windows system. The absolute path denotes the location of a file or directory, starting from the root folder.

Just as fields in a database are used to hold individual pieces of data, files in a file system hold the contents that we interact with on our computers.

Write a program that lets a user enter n and that outputs n! (meaning n*(n-1)*(n-2)*...*2*1). hint: initialize a variable totalvalue to n, and use a loop variable i that counts from n-1 down to 1.

Answers

//  This code snippet calculates n! and stores the answer in the variable p.
// Handle 0! = 1 separately.
if (n==0) {
   p = 1;
}
else {
// Initialize p = n
p = n;

// While loop
while (n>1) {
      p = p*(n-1);
      n = n-1;
     }
}

Which low-cost devices feature crisp text that is capable of being read in even the brightest outdoor conditions?

Answers

Low-cost devices that feature crisp text capable of being read in the brightest outdoor conditions are e-ink readers, such as the Kindle and other e-readers designed for electronic books. These devices mimic the appearance of actual paper and are known for their glare-free screens, which make them perfect for reading in direct sunlight.

The reason e-ink readers offer such clear text in bright light conditions is due to their electronic ink technology. Unlike traditional tablets and smartphones that have backlit LCD or OLED screens, e-ink readers use a type of screen that reflects light much like regular paper does. This not only makes them easier to read in bright conditions, but also makes them more power-efficient, as they don't require a backlight to illuminate their pixels. Additionally, many e-ink devices are budget-friendly, making them an accessible option for avid readers.

Select the tips you should follow when creating a newsletter.

Answers

When creating a newsletter, it is best to have a guideline and follow tips in making a more creative newsletter that will make readers or audiences hook up. The following tips that an individual should follow when creating a news letter are the following:

-          It is best to be clear and concise when writing

-          Be straight and to the point

-          Be emphatic, by having to know the readers or your audiences.

A file that tells a computer how to perform a specific task is called

Answers

A .exe file tells a computer how to perform a specific task. Hope this helps.

(tco 9) the most common protocol(s) used for sending and retrieving e-mail is(are) _____.

Answers

SMTP = Simple Mail Transport Protool

What does ACCU stand for?

Answers

Association of C and C++ Users (ACCU) is a worldwide association of people who are interested in C, C++, and related programming languages.
Air Cooled Condensing Unit

The 16 broad career options developed by the US department of education are called

Answers

The answer is career clusters. 

Answer:

career clusters

Explanation:

Desktop computer systems are less reliable than laptop computers.
a. True
b. False

Answers

b they have the same sofeware
Other Questions
how do ponyboy become a greaser The sign of the product of two integers with the same sign is positive. What is the sign of three integers with the same sign? Explain your thinking. one agent of chemical weathering is _______________ which combines with water to form carbonic acid What makes an irrational number irrational? why is understanding the bacteria communication important for humans What combines to form bonds in compounds?A.atoms of elementsB.moleculesC.types of mineralsD.valences Earth's crust is made up of relatively rigid plates that ride atop Earth's hot, semiliquid mantle. (2) The plates are called tectonic because they're in constant motion. (3) They can move because Earth's mantle is a very hot and semiliquid fluid called magma. (4) Volcanoes are a result of magma rising up or erupting through a plate, particularly where plate boundaries are moving against each other. (5) Also, when plates slide against each other, causing friction along adjacent plate boundaries, earthquakes frequently occur. (6) Therefore, we often find volcanoes and earthquakes along plate boundaries. (7) Plates may also collide. (8) When that happens, mountain ranges are formed. (9) For example, the collision of the plate carrying the Indian subcontinent created the Himalayan Mountains when it collided with the Asian plate. Which statement about this paragraph is accurate? A. There is no single topic sentence. B. The author uses comparison and contrast to organize ideas. C. The topic sentence is the found in the last line. D. There are no supporting details for the main idea. The tensile strength of paper is modeled by a normal distribution with a mean of 35 pounds per square inch and a standard deviation of 2 pounds per square inch. what is the probability that the strength of a sample is less than 38 lb/in2? round your answer to 4 decimal places. What kind of information does the Nutrition Facts label give about requirements for essential nutrients?the number of calories from vitamins and mineralsthe number of servings needed for a nutritious daily dietthe percent of various nutrients in one serving Who suffered when Louis XIV revoked the Edict of Nantes? only English Catholics only French Protestants only aristocrats of all religions only poor, religious peasants What is 8.038108 in standard form?80,308,00080,380,00083,800,000803,800,000 Probiotics are which of the following?a. Microorganisms that live in the digestive tractb. A natural medication used in place of antibioticsc. All of the aboved. A dietary supplement made from yogurt what happens when thermal energy is absorbed Which equation can be used to find one or more factors of 26 The chance of losing time, money, reputation, etc. is known as __________. 1) What team was Lebron James on when he got drafted; 2) What team did he go to when he wanted to form a ultimate team with Chrish Bosh, and Dwayne wade 3) How old was Lebron when he got drafted. 4) Did lebron go straight from Highschool or College or did he just walk on? If your not a band wagon or Lebron fan just beacause he is good you should know this Which of the following is a true equation?1) 10 + 3 + 1 = 13 + 62) 4 - 3 = 73) 4 + 3 - 3 = 7 - 34) 4 + 3 = 7 + 3 Micheal works 15.5 hours each week of a music store. He earns $9.48 per hour. How much does Micheal earn each week? The sample variance is 18.7. what is the sample standard deviation? answer to two decimal places. Above is an image of King Tuts Gold Sarcophagus, which is an example of how the Egyptian commemorated the dead. Explain how Egyptian commemorate the wealthy and royal dead and why? Steam Workshop Downloader