When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of your computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer

Answers

Answer 1

Answer:

d

Explanation:

Answer 2

The correct option is D: Sharing removable disks with an infected computer

Removable disks are disks that use to keep data as well transfer data or information from one computer to another computer.

With Removable disks a computer infected with a virus cannot infect another Computer as the what the user does is to simply insert  the USB port of the  Removable disks into the computer which inturn enable the transfer of data to the computer to take place .

Learn more about Removable disks here:

https://brainly.com/question/4327670


Related Questions

as future software developer what is the difference between

1. Are we developing the software right?
2. Are developing the right software?

Answers

Answer:

Well There are alot of different softwares so thats where "Are developing the right software?" Starts But Sometimes Its easy to mix up! Now, "Are we developing the software right?" Get the code and enter it into google docs, it will show your mistakes. Your welcome.

Verified By Al ✔️

Property Tax

Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.

Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.

Answers

Answer:

sorry i really dont know

Explanation:

Answer:

Here is the C++ program

====================================================

#include <iostream>

#include <iomanip>

using namespace std;

int main(){

const double ASSESS_VALUE_WEIGHT = 0.60;

double houseValue, assessedValue, taxRate, tax;

cout<<"Enter the actual value of property: ";

cin >> houseValue;

cout<<"Enter the current tax rate for every $100: ";

cin >> taxRate;

assessedValue = houseValue * ASSESS_VALUE_WEIGHT;

tax = assessedValue * taxRate / 100;

cout<<setprecision(2)<<fixed<<showpoint;

cout<<"Annual property tax: $ " << tax;

return 0;

}

Explanation:

Hulu suggestions? I just got it and I wanna know what's good :)

Answers

Anime show: naruto

Drama show: sweet Mongolian

Adventure show: outer banks

Answer:

I love hulu almost everything is good but I recommend Zoey's Extrordinary playlist

Explanation:

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

Answers

Answer:

Vulnerability of.

Explanation:

In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

Why do I have two random warnings?

Answers

Just a guess, maybe you’ve been reported for having an incorrect answer two times? I’m really not sure I’m just trying to give out possibilities. Maybe if your a Brainly Helper you haven’t been active so they are giving you warnings? Does clicking on the warning tell you the reason for them? Maybe the system thinks your a robot? I’m not sure just trying to give possible reasons, but you could try contacting customer support, but they aren’t always the quickest at responding.

Have a good day!

Answer:

bc of katie

Explanation:

What are language standards? At this point in your study of programming, what do they mean to
you?

Answers

In computing, a programming language specification (or standard or definition) is a documentation artifact that defines a programming language so that users and implementors can agree on what programs in that language mean.

What is 10X Profit Sites?

Answers

Answer:

Wow! That's amazing!

Explanation:

What is the purpose of application software policies?
a. They define boundaries of what applications are permitted.
b. They use a database of signatures to identify malware.
c. They take log data and convert it into different formats.
d. They serve to help educate users on how to use software more securely

Answers

Answer:

d. They serve to help educate users on how to use software more securely.

Explanation:

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. Thus, option D is correct.

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

Therefore, The purpose of application software policies is that they serve to help educate users on how to use software more securely.

Learn more about software on:

https://brainly.com/question/32393976

#SPJ6

that is Entrepreneur ? ?

Answers

Answer:

An entrepreneur is an individual who creates a new business or, an organization. An entrepreneur combines these to manufacture goods or provide services and provides leadership and management for the business. That is entreprenuer.

Hope this helps...!

Explanation:

Which of these is an example of gathering secondary data?
searching for a chart
drafting a map
collecting soil samples
interviewing experts

Answers

Answer:

searching for a chart

Explanation:

:)

Answer:a

Explanation:

took the quiz

The point-of-view of a game is influenced by the player role and game camera. Give an example of a game that uses omniscient player role. Explain what the game camera perspective looks like for that game and how that camera perspective assists in the omniscient immersive experience.

Answers

Answer:

REWORD

Explanation:

Having choices within a game gives the player a certain amount of control over the game,and can keep them immersed. When a choice is “meaningful” it is so because what you decide will have different outcomes, one such example being the game(s) Skyrim or Fallout 4. With these games, you are presented a multitude of choices, mainly within dialogue, and depending on how you choose to react, you can gain certain quests,.

The _____ is the size of the opening in the camera that the light passes through.

Shutter
Lens
Aperture
Sensor

Answers

The answer is aperture

Answer:

now you can give them brainlist by clicking on the crown on their answer! :)

Explanation:

What is the name of a shortcut you can click to access other websites? A. A post B. A key C. HTML D. A link

Answers

Answer:

D. A link

Explanation:

I hope this helps.

Answer:

A LINK

Explanation:

I just did the test

Input a double and print the first two digits after the decimal point with a space between them. Sample run: Please input a decimal number: 57.8934 Answer: 8 9 Hint - to complete the second coding activity in lesson 5 you had to learn how to get individual digits from an int value. You can reuse this method once you convert the user input to an appropriate int value (you will need both multiplication and casting for this).

Answers

Answer:

number = float(input("Please input a decimal number: "))

number = int (number * 100)

second_digit = number % 10

first_digit = int(number / 10) % 10

print("Answer: " + str(first_digit) + " " + str(second_digit))

Explanation:

Ask the user to enter a decimal number (number = 57.8934)

Multiply it by 100 (number = 5789.34) and typecast to int (number = 5789)

Use the module to get the second digit (9)

Divide the number by 10 (578.9), typecast to int (578) and use module operator to get the first digit (8)

Print the numbers as requested

The code is:

int main(){

double n;

int v, d;

scanf("%lf\n", &n);

n = n*10;

v = (int)n;

d = v%10;

printf("The first digit is %d\n", d);

n = n*10;

v = (int)n;

d = v%10;

printf("The second digit is %d\n", d);

return 0;

}

----------------------

To get each decimal digit, we multiply by 10 until the digit, then calculate the remainder of the operation(mod) of the integer part relative to 10.For example:

57.8934 x 10 = 578.934

The integer part is 578.

The remainder of the division of 578 by 10 is 8.

Now, we have to generalize it, thus:

int main(){

double n;

int v, d;

scanf("%lf\n", &n); -> Reads the double;

/*First digit*/

n = n*10; -> Multiplies by 10.

v = (int)n; -> Casts the integer part

d = v%10; 0 -> Remainder relative to 10 to get the first digit.

printf("The first digit is %d\n", d);

/*Second digit -> Does the same thing*/

n = n*10; -> Multiplies by 10.

v = (int)n; -> Casts the integer part

d = v%10; 0 -> Remainder relative to 10 to get the first digit.

printf("The second digit is %d\n", d);

return 0;

}

A similar problem is given at https://brainly.com/question/18340665

Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a characteristic is necessary for successful completion of the job? Answer by writing a paragraph of two to three sentences.

Answers

Employing someone based on gender is unlawful because, it is the skill which matters to get the required job done and skills are not based on gender. There is no evidence that this particular gender cannot do this job and this particular gender can do. Everyone who posses the required skillsets are eligible to get employed irrespective of gender.

===============================================

I tried my best

What will be the result from running the following program? print grades print 92 print 80print total print 92+80

Answers

Answer:

Grades

92

80

Total

92 + 80

Explanation:

When utilizing quotations, you enable to code to print what wrote, as it is. So, instead of adding the 92 + 80, it's printed out.

I hope this helped!

Good luck <3

What is the difference between an IP address and an IP Packet?

Answers

Answer:

The IP address is a numerical number assigned to a device when connected to the internet for better identification. Whereas, the IP packet is the packet which contains the total information of the content that is carried over the network from host to destination and vice versa.

Explanation:

I hope this helped and plz give brainliest!

Define the P0 and P1 indicators and explain what they mean?

Answers

Answer: The headcount index (P0) is used to measures the proportion of the population which are poor.

The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line.

Explanation:

The headcount index (P0) like the name suggests is used to measure or know the proportion of a population which are poor, this does not indicate or show us how poor, the poor people in that society are.

The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line. This is used or compared to a poverty line already created. To know how far below individuals are under the poverty line system.

PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the children in her class?
Input Device
Output Device
Processing Device
Storage Device

Answers

Answer:

Output device

Explanation:

The screen/projector puts out data (in this case the presentation) for viewers.

The answer us definitely Output Device.
Thank you

Which of the following is NOT an advantage to using inheritance?
a. Code that is shared between classes needs to be written only once.
b. Similar classes can be made to behave consistently.
c. Enhancements to a base class will automatically be applied to derived classes.
d. One big superclass can be used instead of many little classes.

Answers

Answer:

D)One big superclass can be used instead of many little classes.

Explanation:

Inheritance could be described as getting new class on another existing class with almost same execution,

inheritance allows codes to be re-used. It should be noted that inheritance bring about the code sharing among class.

The advantages of using inheritance includes but not limited to

✓ Code that is shared between classes needs to be written only once.

✓Similar classes can be made to behave consistently.

✓ Enhancements to a base class will automatically be applied to derived classes.

A major disadvantage of inheritance is that child/children classes depends on parent class, hence a change in the parent class will affect the child class, therefore option C is the correction option.

Inheritance is a type of programming concept where by a class (Child) can inheritance methods, properties of another class (Parent).

Inheritance allows us to reuse of code, one advantage of Inheritance is that the code that is already present in base class need not be rewritten in the child class.  

The different types of Inheritance are:

Single Inheritance.Multiple Inheritance.Multi-Level Inheritance.Hierarchical Inheritance.Hybrid Inheritance.

Learn more:

https://brainly.com/question/4560494

6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five numbers. c) Find the smallest (minimum) and largest (maximum) of the five entered numbers. d) Write out the results found from steps b and c with a message describing what they are.

Answers

Answer:

Pseudo CODE

a)

n= Input “Enter 5 integer value”

b)

sum=0.0

For loop with i ranging from 0 - 5

Inside loop sum=n[i]+sum

Outside loop avg= sum/5

Print avg

c)

small=n[0] # assume the first number in the list is smallest

large= n[0] # assume the first number in the list is largest

For loop with i ranging from 0 - 5

Inside loop if n[i]<small #if any another number is smaller than small(variable)

Inside if Then small=n[i]

Inside loop if n[i]>large # if any another number is larger than large(variable)

Inside if then large=n[i]

Print small

Print large

d)

print avg

print small

print large

Pseudocodes are used as a prototype of an actual program.

The pseudocode is as follows:

input n1, n2, n3, n4, n5

avg = (n1 + n2 + n3 + n4 + n5)/5

small = n1

large = n1

for i = 2 to 5:

   if n1 > ni then:

       small = ni

   if n1 < ni: then:

       large = ni

print("Average:", avg)

print("Smallest:", small)

print("Largest:", large)

The pseudocode starts by getting inputs for the 5 valuesNext, the average of the 5 values is calculatedThe fourth line iterates through the numbersWithin the iteration, there are 2 conditional statements that calculate the smallest and the largest valuesThe last three lines print the average, the smallest and the largest input

Read more about pseudocodes at:

https://brainly.com/question/24735155

can someone explain to me what coom means? kekw

Answers

If it is espanish it is como and it means how.

Answer:

Outside of referring to the image and meme, Coomer, often lowercased as coomer, is used online as a general insult for an overshrexed young man. The term implies such a person is a sleazy loser, obsessed with masturbatling to pronography because he can't find shrexual partners.

The next four octal numbers after 36 is:________.
a. 36, 37, 40, 41
b. 37, 40, 41, 42
d. 36, 37, 38, 39
c. none of the Above

Answers

Answer: b. 37, 40, 41, 42

Explanation:

The next four octal numbers after 36 is 37, 40, 41, 42.

The octal numeral system, which is also referred to as "oct" for short, is simply base-8 number system.

It is a number system whereby only digits from 0 to 7 are used and there are no letters or numbers that are above 8 that are used.

In this case, after 36, the next number will be 37 after which we go to 40 as we can't write 38 in the octal system. Therefore, the next four octal numbers after 36 is 37, 40, 41, 42.

Choose all of the items that represent functions of the operating system kernel.

memory management

process management

user interface

system input and output (I/O) management

file creation and management

Answers

Answer:

A. memory management

B. process management

D. system input and output (I/O) management

E. file creation and management

Answer:

1,2,4,5

Explanation:

E2020 - Intro to Information Technology

Naseer has inserted an image into his document but needs the image to appear on its own line.

Which option should he choose?

•Top and Bottom
•Tight
•Through
•In front of text

Answers

Answer:

Top and Bottom

Explanation:

took the test

Answer: A

Explanation:

which check the functioning of all the connected hardwares including primary and secondary storage devices​

Answers

Answer: The computer processor

Explanation:

The computer processor is also called the central processing unit and it's function is to analyzes data and also disperses data. It is the computer's brain as it tells the computer the kind of programs to do at a particular time.

The computer processor checks the functioning of all the connected hardwares including primary and secondary storage devices.

What are three ways that you can protect and care for your camera? Why is taking care of your camera important?



Answer in 1-3 sentences.

Answers

avoid dirt and sand, touching your camera lense, and any type of liquid. be careful when cleaning dirt and sand off of your camera lense, as not doing so could scratch lense.

What is the Internet address of the speech you listed to?

Answers

Answer:

To get the address of a website page, check the URL address at the top of the browser window.

Explanation:

The internet is global interconnection of multiple networks. All devices in the network must have a web address to communicate in the network. The IP version 4 and 6 are two concepts of addressing devices on the internet. The DHCP and DNS internet protocols are used to assign address and map addresses to string-like URLs respectively.

identify the benefit of modeling to communicate a solution. ​

Answers

Answer:

provides a graphical design or representation of solution with symbols.

Explanation:

Communication models help identify and understand the components and relationship of the communication process being studied. Models represent new ideas and thought on various aspects of communication which helps us to plan for effective communication system.

Answer: D

Explanation:

What is the outside of an iPhone called?

Answers

What, what are you talking about

Sam card tray is the answer

Other Questions
PLEASE HELP ME IM STUCK ON A,B,C PLEASE HELP PLEASE I NEED THE ANSWER LIKE IN THE NEXT 10 MINS!!!!!What is f(-2) of the function given below? F(x)=3x^2-4x+1 More than 200 different type of cels exist in the human body. Why do you think these cells are important for various body functions? Explain your response Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it appear to come from another employee's account. Be sure to include some SMTP commands the culprit might have used. What is the simplified answer? What is the mean for the following set of population scores:Xf7161524336261166280403.3 If Ze orders a book from Store Y, how much tax will she pay? Comparison of Online Bookstores Store X Store Y Cost of book $17.00 $18.00 Tax rate 6% 8% Shipping 10% of cost before tax FREE $1.44 $2.25 $12.25 $14.40 What is authentication?The process of converting data that has been converted into an unreadable form of text back to its original formBThe process of converting data into an unreadable form of textOThe process of verifying the identity of a user who logs on to a system, or the integrity of transmitted dataDThe process of providing proof that a transaction occurred between identified parties which value of x satisfies the equation 7/3 (x + 9/28) = 20? which of these is the best way for your family to promote healthful eating choices 85 80 100 xHow do I do this? Why do you think the majority of the population of Egyptlive along the Nile River?What is significant about the river? What is the variable that affects enzyme function in the example of phosphofructokinase-1? Fill in the blanks. A virus is a type of _______. You need a _______ to see a virus. A virus makes us sick by stopping the human________ from working properly. When you have a ________ or a ________ it tells us that your ___________________________________ is fighting against the virus. ax + by = cTo solve each literal equation for the given variable A closed system is one where there is an exchange of resources with external systems.a) trueb) false The MSDS for chloroform indicates that it is a clear liquid that has a pleasant smell and a substantial vapor pressure. Poeple should avoid inhailing its vapors, and it is sensitive to light .Malik needs 10 mls of chloroform for an expiriment.According to this information , how should hge safely pour the chloroform? Which statement is NOT true? *A. Every integer is a real number.B Every counting number is an integerC Every integer is a rational numberD Every decimal number is an irrational number. What happens to the particles of a sample of water as it is changed into ice?-they become more compact-they move faster Help plz, will give brainiest to the first person.