Select the three type of undesirable software.

virus
firewall
peer-to-peer
nannyware
adware
malware
VPN

Answers

Answer 1

Virus, Adware, Malware


Related Questions

A student was asked to describe how a Huffman tree could be created for the string in Figure 2. Her response was: "I would count the number of times each character appears in the string and create a frequency table sorted alphabetically. For example, the letter S has the highest frequency in Figure 2. Next I would take the two characters with the highest frequencies and combine them into a new node. The new node would be added to the end of the frequency table. The two characters with the lowest remaining frequencies are now combined into a new node and the process is repeated until all the characters have been added to nodes and the tree created. " State four mistakes the student has made in her response

Answers

1. The student incorrectly listed the frequency table for the provided string. 2. The student left out instructions on how to handle ties in the frequency table. 3. The student failed to describe how to give binary codes to characters in the Huffman tree.

3. The student did not explain how to assign binary codes to the Huffman tree's characters. 4. The student left out the last step of utilising the created Huffman tree to encode the string. In total, the student's attempt to construct a Huffman tree had four errors. These omissions include failing to provide the proper frequency table, failing to address how ties should be handled, failing to describe how to assign binary codes to characters, and failing to bring up the string's final encoding phase. The two lowest frequency characters are combined to form a new node, and this process is repeated until only one root node remains, creating a Huffman tree. Characters are given binary codes based on the route taken from the root to the leaf node. The encoded text is then created by replacing each character in the Huffman tree with its appropriate binary code.

learn more about frequency table here:

https://brainly.com/question/28931302

#SPJ4

Which code shows the correct version of the loop shown below?
It should print all the numbers in list a.

Which code shows the correct version of the loop shown below?It should print all the numbers in list

Answers

Answer:

The second program code segment must show the data in the same list being used ... loop, the function terminates by returning the number of correct answers.

Explanation:

The second program code segment must show the data in the same list being used ... loop, the function terminates by returning the number of correct answers.

importance of computer education​

Answers

Answer:

hope this helped

Explanation:

Computer technology has helped the world to grow and evolve quickly. By performing tasks quickly, computers make daily activities more convenient. They give people access to a wide array of information and can reach even the most remote locations on the planet.

which of the following is the first step of query processing at the dbms server end? question 39 options: a) executing b) fetching c) parsing d) delivering

Answers

The first step of query processing at the DBMS server end is parsing.

Parsing involves analyzing and interpreting the syntax and structure of the query to ensure that it is valid and can be executed. During this step, the system checks for any syntax errors and creates a parse tree that represents the logical structure of the query.

Once the parsing is complete, the system moves on to the next steps of query processing, such as optimization and execution.

For more questions like Optimization click the link below:

https://brainly.com/question/29521416

#SPJ11

Key end users should be assigned to a developmental team, known as the united application development team. True or False

Answers

The given statement "Key end users should be assigned to a developmental team, known as the united application development team" is TRUE

.A united application development team is a group of individuals who come together to develop an application that meets certain requirements. This group will include developers, testers, and project managers, among other roles.

However, the team's success is dependent on the involvement of the end-users who provide feedback on the application during the development process. It is important for key end-users to be assigned to the team because they can provide valuable insight into the application's functionality and user-friendliness. Key end-users are those who will be the primary users of the application.  

Learn more about developmental team at

https://brainly.com/question/31164482

#SPJ11

Which distributions are made by, or clones of, Red Hat?
(choose two)
-Fedora
-Ubuntu
-Slackware
-Debian
-CentOS

Answers

Two distributions that are made by or clones of Red Hat are Fedora and CentOS.

Fedora is a community-driven distribution that is sponsored by Red Hat. It serves as a testing ground for new features and technologies that eventually make their way into Red Hat Enterprise Linux (RHEL), which is the commercial version of the distribution. Fedora is known for its frequent updates and focus on cutting-edge software.

CentOS, on the other hand, is a free and open-source distribution that is derived from the source code of RHEL. It aims to provide a stable and reliable operating system that is compatible with RHEL. CentOS follows the same release cycle as RHEL and receives updates and security patches to ensure long-term support.

Ubuntu, Slackware, and Debian are not directly associated with Red Hat. Ubuntu is a popular Linux distribution developed by Canonical Ltd. Slackware is one of the oldest actively maintained Linux distributions that follows a simple and traditional design. Debian is a community-driven distribution known for its stability and wide range of software packages. While these distributions are highly regarded in the Linux community, they are not directly linked to Red Hat or based on its codebase.

Learn more about version here:

https://brainly.com/question/18796371

#SPJ11

what is an application window​

Answers

Answer:

This type of window is called an application window or main window. It typically has a frame with a title bar, Minimize and Maximize buttons, and other standard UI elements. The frame is called the non-client area of the window, so called because the operating system manages that portion of the window.

It typically have a frame with a title bar

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Click the above imageAsk the user to enter two numbers. The first number is for the multiplication table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose the best answers

Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose

Answers

Answer:

i7tyerged

Explanation:

A web page's content can change based on how the user interacts with it.

Answers

Yes | Mostly

Many websites use cookies and more extensions were it collects data to personalize the results you find. For example you go on a website everyday are daily news and you like to read about crime around you. If the website uses cookie or other extensions, they can personalize on that topic and it might take down your location for more news around you. Hope this helps!

Answer:

A  dynamic  web page's content can change based on how the user interacts with it.

Explanation:

dynamic web page: a web page that contains elements that change

Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network already installed. Lori's notebook computer has an integrated wireless network adapter. Her printer has an Ethernet card, but is not wireless enabled. Your task is to select the appropriate devices and cables (without spending more than necessary) to set up a network that provides wireless access for Lori's laptop and wired access for her printer.

Match the labels for the components on the left to the locations where they need to be installed in Lori's home office on the right.

Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network
Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network

Answers

hi there!

Answer:

1. cat6 cable

2. wireless ethernet router

3. cat5e cable

Explanation:

1. you need a cat6 cable to be capable to deliver the gigabyte ethernet data to the network device.

2. you need a wireless device to provide wireless connection to her notebook.

3. for a printer no cat6 is necessary you can use cat5e cable and it will be enough.

hope this helps.

Connection to the gigabit ethernet network must be done with Cat6 Cable. Using the wireless ethernet router as the network device and connecting the cable to the printer must be done with Cat5e Cable.

We can arrive at this answer because:

The Cat6 Cable will be responsible for establishing a bridge between the gigabyte Ethernet and the network device, allowing data delivery to be made between the two systems.This connection must be made with a wireless device, to keep it more stabilized and it needs, mainly, for the notebook to receive the internet signal. This will be done using the wireless ethernet router.The printer needs a softer, less rigid connection, so a Cat5e cable will be a convenient option.

In this case, we can see that using these devices will allow Lori to have a more stable and efficient connection to meet her needs.

More information on network connection at the link:

https://brainly.com/question/8118353


Bundlr is an example of gatekeeper technology.
Group startsTrue or False

Answers

Answer:

False

Explanation:

An IS auditor performing a data center review for a large company discovers that the data center has a lead-acid battery room to provide power to its ...

Answers

An IS auditor performing a data center review for a large company discovers that the data center has a lead-acid battery room to provide power to its critical IT systems in the event of a power outage.

During a recent review of a large company's data center, the auditor discovered that the facility has a lead-acid battery room to provide backup power in the event of a power outage. Lead-acid batteries are commonly used in data centers because they are reliable and provide a high level of energy storage.

However, they can also be hazardous to the environment if not disposed of properly. The auditor should recommend that the company implement a proper battery recycling program to ensure that the lead-acid batteries are disposed of safely and in compliance with environmental regulations.

Learn more about backup power at https://brainly.com/question/30140660

#SPJ11

When you pull into the middle of an intersection to properly secure a left turn you are _

Answers

Answer:

declaring your intention to turn

Explanation:

When you enter the intersection, stay to the right of the center line. Keep your wheels straight to avoid being pushed into oncoming traffic should a rear-end collision occur. When approaching traffic clears or stops for a red light, complete your turn.

Hope this helps!

Brainliest and a like is much appreciated!

how to use blocked websites on school laptops

Answers

Answer:

You can open the blocked sites on your school Wi-Fi network by using a VPN service. So, what is a VPN? VPN stands for Virtual Private Network.

Explanation:

The CK sales manager wants to boost productivity by providing insights for sales reps at the start of each day. Which three sales-specific standard Lightning components should an administrator add to the homepage to meet this requirement

Answers

The three sales-specific standard Lightning components should an administrator add to the homepage to meet this requirement are path, activities and Key deals.

What is the meaning of Productivity?

Productivity refers to the state of being highly efficient in the work to give the high level of the output in the production.

The complete question is attached below.

The three sales-specific requirements Path, activities, and Key Deals are Lightning components that an administrator should add to the homepage to satisfy this criteria.

Learn more about Lightning components here:

https://brainly.com/question/14315478

#SPJ1

The CK sales manager wants to boost productivity by providing insights for sales reps at the start of

Seeing information on a computer screen is what type of output?

Answers

Answer:

Any information processed by and sent out from a computer or other electronic device is considered output. An example of output is anything viewed on your computer monitor screen, such as the words you type on your keyboard. Without some type of output that a human could see, feel, or hear, a human could not interact with the computer.

Explanation:

Any information processed by and sent out from a computer or other electronic device is considered output. An example of output is anything viewed on your computer monitor screen, such as the words you type on your keyboard. Without some type of output that a human could see, feel, or hear, a human could not interact with the computer.

what channel does the news come on?

i dont have cable i have roku :\

Answers

Answer:

I have roku to

Explanation:

I think there's is a channel for it just search up news it probs come up

when an external device is ready to accept more data from the processor, the i/o module for that external device sends an __________ signal to the processor.

Answers

When an external device is ready to accept more data from the processor, the I/O module for that device sends an interrupt signal to the processor.

In computer systems, when an external device is prepared to receive more data from the processor, it sends an interrupt signal to the processor's I/O module. This signal is used to alert the processor that the device is ready for data transfer and is awaiting further instructions.

Interrupts are a fundamental mechanism in computer architectures that allow devices to asynchronously communicate with the processor. When an external device sends an interrupt signal, it temporarily halts the normal execution of the processor and transfers control to an interrupt handler routine. The interrupt handler then processes the interrupt and performs the necessary actions to initiate data transfer or handle the device's request.

The interrupt signal serves as a means of communication between the external device and the processor, ensuring efficient and timely data transfer. By interrupting the processor's normal execution, the device can promptly notify the processor about its readiness to accept data, enabling efficient utilization of system resources and coordination between the processor and the external device.

In summary, when an external device is ready to accept more data from the processor, the I/O module for that device sends an interrupt signal. This interrupt serves as a communication mechanism, allowing the device to notify the processor and initiate the necessary actions for data transfer or handling the device's request.

Learn more about  I/O module here:

https://brainly.com/question/20350801

#SPJ11

Which component inside a computer produces the most heat? A PSU B CPU C GPU D RAM

Answers

A PSU is the component inside of a computer that creates the most heat

What is e-governence?What are the advantage of it.​

Answers

Answer:

The advantages of e-government include an improved flow of information from citizen to government, government to citizen, and within government itself. Additionally, e-government helps modernize administration procedures, improving economies and promoting transparency in the process.

E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region.

c. Create a recipient list to send on April 3, 2014 using the information below. Submit your file to your
teacher along with this worksheet. (3 points)
• Name: Elise Ziolkowski; Address: 1800 Clear Ave, Ferndale, CA 99825
• Name: Miguel Hernandez, Address: 236 Mountain Terrace, Ferndale, CA 99825

Answers

Recipient List  -

Name -:  Elise Ziolkowski; Address: 1800 Clear Ave, Ferndale, CA 99825Name  -: Miguel Hernandez; Address: 236 Mountain Terrace, Ferndale, CA 99825.

What is a recipient list?

A recipient list is a collection   of names and addresses of individuals or entities to whom a message,document, or package is intended to be sent.

It serves as a reference for   ensuring that the communication reaches the intended recipients accuratelyand efficiently.

Learn more about recipient list at:

https://brainly.com/question/29833381

#SPJ1

Place the steps for creating a subfolder in the inbox and moving a message into the new folder in order.
Name the new folder.
Click the message.
Drag and drop in the
folder.
Select New Folder.
Right-click on Inbox.

Answers

Right-click on Inbox

Select "New Folder"

Name the new folder

Click the message

Drag and drop in the folder

classify each rate law based on whether the reaction is first-order, second-order, or third-order overall. you are currently in a sorting module. turn off browse mode or quick nav, tab to items, space or enter to pick up, tab to move, space or enter to drop. first-order second-order third-order

Answers

The classification will be done by analyzing the exponents of the reactant concentrations in the rate law equation.

To determine the overall reaction order, we need to examine the exponents of the reactant concentrations in the rate law equation. If the exponent is 1, the reaction is classified as first-order. If the exponent is 2, the reaction is classified as second-order. If the exponent is 3, the reaction is classified as third-order.

By analyzing the rate law equation and identifying the exponents associated with each reactant, we can classify the reaction as first-order, second-order, or third-order overall. This classification provides valuable information about the rate of the reaction and helps in understanding the kinetics of the chemical process.

Learn more about sorting here : brainly.com/question/32237883

#SPJ11

Do you think that the United States would have been able to win world war l and world war ll without the help of code talkers?

Answers

Code talkers helped US to win both the world wars. As the code talkers were the persons who are experts in delivering secret messages in both regional languages and English.

A name, code talker, was given to American Indians who used their regional language to convey secret messages in the warzones.

Type 1 code was the first code created. Code talkers had a tough task of keep moving because there was always a threat to the transmitted messages.

To learn more about code talkers,

https://brainly.com/question/27876958

The Color Picker tool enables you to work with color selections. Which of the following color models are used by the Color Picker?

Select one or more:
Lab - Luminescence, A (green to red), B (blue to yellow)
CMYK - Cyan, Magenta, Yellow, Black
RGB - Red, Green, Blue
HSB - Hue, Saturation, Brightness

Answers

Answer:

RGB-Red, green, blue

Explanation:

Python and using function

Takes two integer parameters. Returns the integer that is closest to 10

Answers

Answer:

def closest_to_10(num1, num2):

   if num1-10 < num2-10:

       return num2

   else:

       return num1

Explanation:

Which blue line indicates that the library panel will be added to the adjustments panel group?
BRAIN OO
BRAIN

Answers

there is no image here

When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly?

A. Press the DELETE key THREE times
B. Finish typing the word, and then run a spell check
C. Press the BACKSPACE key four times
D. Triple-click the word to select it, then retype it correctly

Answers

Answer:

C. press the Backspace key four times

Explanation:

When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly is to Press the BACKSPACE key four times

Most times people do delete a character to the right of the insertion point by pressing delete and a character to the left of the insertion point by pressing backspace

It is often better to select the text you want to remove, then press the Delete key.

Conclusively, to quickly move an insertion point up to the start of the previous paragraph, just Press Ctrl+Up Arrow (Windows).

Learn more from

https://brainly.com/question/19286999

what is the full from of tc​

Answers

Answer:

There is no specific meaning of this

Explanation:

   Traffic Control: This refers to the process of managing network traffic to optimize performance and prevent congestion.

   Thread Control: This refers to the process of managing threads in a multi-threaded application, including creation, deletion, and synchronization.

   Type Conversion: This refers to the process of converting a value from one data type to another, such as converting an integer to a floating-point number.

   Terminal Control: This refers to the process of controlling a computer terminal or console, including input/output and formatting.

   Trusted Computing: This refers to a set of technologies and standards designed to provide greater security and trust in computing systems and networks.

Other Questions
The Brazilian Amazon Rain forest faces the critical issue of deforestation that is damaging the local evenglobal environment. Historically, there was a growing number of local Brazilian people logging on theAmazon Rainforest and that accelerated the deforestation. What is this problem of over-logging called?To correct for this problem, the Brazilian Government couldA. This is a Tragedy of the Commons Problem. The Brazilian Government can auction off alimited number of logging permits.B. This is a Free Rider Problem. The Brazilian Government can internalize the externality bysubsidizing the production of logging.C. This is a Tragedy of the Commons Problem. The Brazilian Government can wait until themarket corrects the problem.D. This is a Free Rider Problem. The Brazilian Government can wait until the market correctsthe problem How many oxygen (O) atoms are in a molecule of Cg H,O3?A. 1B. 3C. 10D. 4 answer both pls !!!!! Describe the 6 ways in which the approach to public health changed over time sodium hydroxide is added to water. What is the balanced equation for this ionization? Company Earnings per Share Market Value per Share 1 $ 12.00 $ 176.40 2 10.00 96.00 3 7.50 93.75 4 50.00 250.00 Compute the price-earnings ratio for each of these four separate companies. Hammer orchids are plants with flowers that are highly modified to resemble a female thynnid wasp (i.e., a wasp of the Thynnidae family) and can only be pollinated by thynnid wasps. Female thynnid wasps cannot fly, but males can. When the female is prepared to mate, she will climb up a tall plant or a blade of grass and wait for a male to appear. Males will pick up the female from her perch and mate with her in flight. Given this information, in three to five sentences, describe these details:one other feature of the hammer orchid that could attract its pollinatorhow the orchids flower adaptation could lead to pollinationwhy you believe a plant would have more reproductive success with either a specialized pollinator or multiple pollinatorsi need help!! y'all wht should i put? the adjusting entry to record supplies used during the period includes a: multiple choice debit to supplies. credit to cash debit to supplies expense credit to service revenue For brainliest Please 3 1/4 - 1 3/5 | please help !! what is the most common level of education that Film and Video Editors have? bachelors degreesome college, no degreeassociate degreehigh school diploma or equivalent A cruise ship can cover 19 nautical miles in 342 minutes. How many nautical miles will it travel in 270 minutes? HELP ASAP 8. A rock dropped in a graduated cylinder raises the level of water from 20 mL to 35 mL.The rock has a mass of 45 g. What is the density of the rock? Problem 1 (30 points) Consider two objects of masses m= 6.719 kg and m = 2.525 kg. The first mass (m) is traveling along the negative y- axis at 51.33 km/hr and strikes the second stationary mass m, locking the two masses together. a) (5 Points) What is the velocity of the first mass before the collision? Vm=< > m/s b) (3 Points) What is the velocity of the second mass before the collision? Vm2 =< 0 0 0 > m/s c) (1 Point) The final velocity of the two masses can be calculated using the formula number: (Note: use the formula-sheet given in the introduction section) d) (5 Points) What is the final velocity of the two masses? V=< > m/s f) (4 Points) What is the total initial kinetic energy of the two masses? Ki= J g) (5 Points) What is the total final kinetic energy of the two masses? Kf= J h) (3 Points) How much of the mechanical energy is lost due to this collision? AEint= J Please answer all parts of the question. Which statement best explains why the Tenth Amendment reserves some rights and powers to the states?The framers believed in the principle of federalism.The framers wanted the states to be very powerful.The framers wanted to limit citizens rights.The framers wanted to control civil liberties. Solve for x given that QRST is a rhombus. Directions: Find the indirect object(s) in the sentence below.We left the teachers some apples from our bag.WeteachersapplesNextof Please help me i need to turn this in soon and i don't understand How much is the resistance in a circuit if 15 V of potential difference produces 500 A of current?30 k3 M300 k3 k the nurse is teaching a client prescribed the antianxiety agent chlordiazepoxide. the nurse should incorporate which instruction into the teaching plan?