Which virus is also known as hybrid virus ?​

Answers

Answer 1

Answer:

A multipartite virus

Explanation:


Related Questions

What is e-learning
can anyone tell me in her/his own words

Answers

in my own words it’s learning new thing from electronics or digital resources

1. For the Boolean functions E and F, as given in the following truth table
XYZ E
F
1
1 0
0
1
1
0
0
0
1
1
1
0
1
1 1 0
0
0
0
0
1
1
1
1
00
0
1
1
0
0
0
0
1
0
1
0
1
1
XYZ
XYZ
बोर
xyz
XFF
XFI
XYZ
xyz
Note
letters in bold mean that it's a compliment.
a.
List the minterms and maxterms of each function
b. List the minterms of E and F
c.
List the minterms of E+ F and E.F
d. Express E and F in sum of minterms algebraic form.
e. Simply E and F to expressions with a minimum of literals

Answers

Answer:

xxxxxxxxxxxxyyyyyyyyyyyyppppppppp537888264778

Which of the following network topology is most expensive
to implement and maintain?

Answers

The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.

What is Network topology?

Network topology is known to be a term that connote the setting of the elements that pertains to a communication network.

Note that Network topology can be one that is used to state or describe the pattern of arrangement of a lot of different types of telecommunication networks.

Therefore, The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.

Learn more about network topology from

https://brainly.com/question/17036446

#SPJ1

Which of the following is the most expensive network topology?

(a) Star

(b) Mesh

(c) Bus

diffention of window vista

Answers

A significant update to Microsoft's Windows NT operating system is Windows Vista. The longest gap between versions of a Microsoft Windows desktop operating system at the time, Windows XP, which was launched five years prior, was directly replaced by it.

what is the entity relationship model?

Answers

also known as an entity relationship model, its a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.

You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle’s database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don’t know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.

Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision-making.

Answers

A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:

Hello, Ms. Roye,

I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.

One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.

I would urge you to rethink your use of this version of Oracle

What is a Memo?

This refers to the written message that is usually used in a professional setting to communicate.

Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.

Read more about memo here:

https://brainly.com/question/11736904

#SPJ1

As the complexity of a network increases, the possibility of security breaches decreases. is this true or false

Answers

As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

What is the complexity of a network?

Network complexity is known to be a term that connote the series of nodes and alternative paths that is said to often exist inside of a computer network.

A network is seen to be complex due to the nature of its functions as it is known to be often multipurpose in nature.

It is one that is seen as the different kinds  of communication media, communications equipment, as well as the protocols, hardware and software applications that can be located in the network.

Therefore, As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

Learn more about security breaches from

https://brainly.com/question/24956493
#SPJ1

Define the three overarching domains that contain application software, system software and hardware layers along with the
layers of abstraction in each, and explain in detail how each of these layers, whether software or hardware, interacts with the
others. Explain your answer in 3-5 sentences.

Answers

Answer:

The three overarching domains that contain application software, system software and hardware layers are:

- The kernel: This is the lowest level of software, and it interacts directly with the hardware.

- User space: This is where most applications live, and it is separate from the kernel to protect the stability of the system.

- Shells and GUIs: These provide a way for the user to interact with the system.

The hardware layer is the lowest level, and it consists of the actual physical components of the system. The software layers sit on top of the hardware, and they are responsible for running the system. The application software is the highest level, and it consists of the programs that the user runs. The system software is in the middle, and it consists of the operating system and other utilities that manage the system.

Explanation:

Hope this helps!

The three overarching domains in computing are application software, system software, and hardware layers, which interact through standardized interfaces and protocols to execute tasks and processes seamlessly.

Overarching domains in computing represent distinct layers, where application software serves as the user-facing programs tailored to specific tasks, system software acts as a mediator managing essential system functions and services, and hardware encompasses tangible components like CPUs, memory, and devices.

These domains collaborate harmoniously through standardized interfaces and protocols, enabling seamless interactions that harness the combined power of software and hardware, cultivating a flourishing digital landscape with the artistry of functionality and innovation.

Learn more about overarching domains here:

https://brainly.com/question/31608948

#SPJ7

Can you please give a layman's explanation of the sigmoid function and its applications in machine learning? Why use a sigmoid function instead of, say, a simple Z-score for data normalization?

Answers

The sigmoid function and its applications in machine learning is that Sigmoid Function is one that act as a kind of an activation function in regards to machine learning which is said to be used to input any form of non-linearity in a machine learning model.

One can say that it decides the type of value that one can pass as output and what cannot be pass.

Why use a sigmoid function instead of, say, a simple Z-score for data normalization?

The main reason that one can say is the key reason why people make use of the sigmoid function is due to the fact that it is one that exists between (0 to 1).

So, it is one that is used for models where a person can have to be able to know the probability as an output.

Therefore, The sigmoid function and its applications in machine learning is that Sigmoid Function is one that act as a kind of an activation function in regards to machine learning which is said to be used to input any form of non-linearity in a machine learning model.

Learn more about machine learning from

https://brainly.com/question/25523571
#SPJ1

Using pseudocode, provide an algorithm that would test to see if any two people in a group of about 30 people have the same birthday.

Answers

Zodiac signs because they are pseudoscience and will tell you who has the same birthday

input("Enter a number: ")
print(num * 9)

Answers

Note that in the above case, if a person save the input as num,

this will print the input 9 times.

How do you go about this code?

Therefore, since there is 9 times:

So

num = input("Enter a number: ")

print(num * 9)

If a person actually want to do a real math calculations, then one need to input needs to be inside the number.

num = float(input("Enter a number: "))

print(num * 9)

This  is one that do not  bring about any errors where the user do not input a number.

Learn more about coding from

https://brainly.com/question/23275071

#SPJ1

how to find area of square

Answers

Answer: area= s²

Explanation: When finding an area of a square, squares all their sides of the same length. You only need two sides to get the area inside. Since it is the same number, you are multiplying the number by itself, hence why it is squared.

So, you basically get the measurement of one side of the square, and multiply it by itself

Answer:  area=- s2

Explanation:

a functions is where a relations has only one _ for every _.

Answers

Answer:

A function is where a relation has only one output for every input.

Explanation:

Hope this helps :)

what is the function of a head frame

Answers

Answer:

it is to enable the hoisting of machinery,personnel or materials.

Explanation:

which means it is use to raise materials during construction work

What command would you enter while in vi command mode to find the term Sam?

Answers

The command "/Sam"  would enter while in vi command mode to find the term Sam.

What is vi command?

Vi is the name of the standard editor included with the UNIX operating system.

A full-screen editor with two modes of operation, the UNIX vi editor:

Commands in the command mode that affect the file's behavior and, Text entered during the insert mode is added to the file.

Every character entered the command mode is a command that alters the text file being edited; a character may even trigger the vi editor to switch to insert mode. Every character entered during insert mode is added to the text in the file; insert mode is disabled by pressing the Esc (Escape) key.

Even though there are many vi commands, learning only a few of them is generally enough for beginners. This website includes a list of common vi commands to help such users. In the tables below, the most fundamental and practical commands are denoted by an asterisk (* or star). These instructions ought to become automatic with experience.

To get more information about  vi command :

https://brainly.com/question/9671960

#SPJ1

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

how can we clearly communicate how to draw something on a screen

Answers

The way we can clearly communicate how to draw something on a screen are:

First the person need to be clear on what they what them to drawThen they need to give examples or make use of a  diagram that the people are going to draw. Note that one need to also be patient and try to convey the ways to draw every minute.Lastly let them practice what you have said on their own.

What is communication and explain?

Communication is known to be a term that connote the act of providing, receiving, as well as  sharing information.

Note that Good communicators are those that  listen carefully, speak  and also write clearly, as well as understand the message that is been delivered.

It is seen as the process through which information is said to be exchanged between people through a some system of symbols, signs and others.

Therefore, The way we can clearly communicate how to draw something on a screen are:

First the person need to be clear on what they what them to drawThen they need to give examples or make use of a  diagram that the people are going to draw. Note that one need to also be patient and try to convey the ways to draw every minute.Lastly let them practice what you have said on their own.

Learn more about communication from

https://brainly.com/question/25793182
#SPJ1

Activity
Perform an online search and identify the tools for system management. Describe the features/functions of any three system management tools

Answers

The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

What are the function of hardware features?

The feature and functions of inventory management is that they are  said to be tools that are used to tell or know the right amount and type of input products, as well as the products in process and those that are finished products.

Note that it helps in the facilitating of any production and sales operations.

Therefore, The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

Learn more about  management tools from

https://brainly.com/question/24662469
#SPJ1

Describe what happens when you add an additional bit to a binary number in terms of the amount of data (combinations) it can store.

Answers

Answer:

You double the amount of combinations.

Explanation:

Each bit doubles the number of combinations.

n bits = 2ⁿ combinations

n+1 bits = 2ⁿ⁺¹ = 2·2ⁿ

Do you believe that software manufacturers should be tolerant of the practice of software piracy in third-world countries to allow these countries an opportunity to move more quickly into the information age? Why or why not? What would the benefits and disadvantages of this be?​

Answers

Answer:

I do not believe that software manufacturers should be tolerant of the practice of software piracy in third-world countries. I believe that this would be a disservice to the software manufacturers, as well as to the countries themselves.

The benefits of software piracy are that it allows countries to have access to software that they would otherwise be unable to afford. However, the disadvantages are that it encourages people to pirate software instead of buying it, which hurts the software industry. It also means that people in these countries are using software that is not licensed, which could lead to security and stability issues.

Explanation:

Hope this helps!

Within the manufacturing industry, there are fourteen subindustries. Which of the
following is one of these subindustries?

A) Shipping and warehousing.

B) Petroleum and coal products.

C) Automobile manufacturing.

D) Concrete and steel.

Answers

Answer: A or B i done this before but my memorys quite blurry i rekon doing A

Explanation:

The internet allows you quick access to research and digital media what do you need to do if you want to use someone’s else’s work?

Answers

Answer:

You need to cite someone else's work

Explanation:

Question 1 The Movie class includes a toString method. Suppose another class is using the Movie class and has declared m as a Movie and initialized m. Which TWO of the following would use the toString method correctly to print out information about the movie m? 1 point 1 System.out.println(m); 1 System.out.println(toString()); 1 System.out.println(m.toString); 1

Answers

The two print statement which would use the toString method correctly to print out information about the movie m are:

System.out.println(toString()); 1.System.out.println(m.toString()); 1.

What is a method?

In Computer programming, a method can be defined as a block of executable code (sets of instruction) that are written and used by programmers to break down a given problem into small but manageable fragments (pieces).

This ultimately implies that, methods are typically written and used by programmers to break down any complex problem into simple and manageable fragments (pieces) such as in modern programming languages, which comprises several predefined methods.

In conclusion, the "System.out.println(toString());1" and "System.out.println(m.toString()); 1" calls the toString() function which then returns the string representation of the object movie.

Read more on print methods here: https://brainly.com/question/19594241

#SPJ1

what is computer? where it is used?​

Answers

Answer:

it is an electronic device for storing and processing data and it is used at homes schools business organizations.

Explanation:

brainliest

What method is used to ensure proper ventilation in a server room?
Internal cooling systems
Maintaining a steady temperature
Hot and cold aisles
Internal fans

Answers

A method which is used to ensure proper ventilation in a server room is: C. Hot and cold aisles.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

What is a server room?

In Computer technology, a server room is also referred to as a data center and it can be defined as a dedicated space (room) that is typically used for keeping a collection of servers and other network devices.

Generally, hot and cold aisles are often used in server rooms (data centers) to ensure proper ventilation, especially by removing hot air and pushing cool air into the server room.

Read more on hot and cold aisles here: https://brainly.com/question/13860889

#SPJ1

Is Computer Science a science? explain​

Answers

Answer:

Computer Science is a science because it is a systematic and logical approach to discovering how computers work and to solving problems through the use of computers.

Explanation:

Hope this helps!

Answer:

Computer science is considered a science because it involves the study of algorithms and computational systems, which are based on scientific principles such as logic and mathematical principles. It involves the use of scientific methods, such as experimentation and data analysis, to design and develop new technologies and systems. Additionally, computer science research often involves collaboration with other scientific fields, such as biology, physics, and engineering, to solve complex problems and advance scientific knowledge. Overall, computer science is a field that applies scientific principles and methods to the study of computational systems and technologies.

Explanation:

The
tests the ability of a networking technician to install,
maintain, troubleshoot, and support a network, and understand various aspects of
networking technologies, including TCP/IP and the OSI models.
COMPTIA NETWORK+
COMPTIA A+
COMPTIA ACCESS
COMPTIA A+

Answers

The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies, including TCP/IP and the OSI models.

Who is a Network Technician?

This refers to a person that oversees a network to check and control the vulnerabilities in it.

Hence, we can see that The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies.

Read more about network certifications here:

https://brainly.com/question/14472075

#SPJ1

Answer:compita network+

Explanation:I just did it and got it right big w

Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.

Sample Run:

Enter the Yards: 3
Enter the Feet: 2
Enter the Yards: 4
Enter the Feet: 1

Sample Output:
Yards: 8 Feet: 0

Answers

The program accepts separate fabric lengths in feet and inches and displays the total fabric length in feet and inches.

What is programming?

Creating a set of instructions that tells a computer how to perform a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

The Python 3 program is as follows:

feet_1 = int(input('length in feets : '))

Prompts user to enter feet length of fabric 1

inch_1 = int(input('length in inch : '))

Inch length of fabric 1

feet_2 = int(input('length in feets : '))

Feet length of fabric 2

inch_2 = int(input('length in inch : '))

Inch length of fabric 2

inch_sum = inch_1 + inch_2

Sum of the inches

inch_left = inch_sum%12

Remainder in inches after converting to feets

inch_to_feet = inch_sum // 12

Whole number of the converted inch sum

feet_sum = feet_1 + feet_2 + inch_left

Total sum of the feet length

print('Feet : %d Inches : %d' %(feet_sum, inch_left))

Display the sum

Thus, this can be the format for given scenario.

For more details regarding programming, visit:

https://brainly.com/question/14368396

#SPJ1

What is presentation system? Explain the usage of presentation system in government office.

Answers

Answer:

A presentation system is a group of equipment used to give a presentation. It can include a projector, screen, computer, audio system, and more. Presentation systems are often used in government offices for training, briefings, and other events.

Explanation:

Hope this helps!

2.10.2: Math functions Compute: z = y/|x|

Answers

Answer:

What variable do I solve for?

Explanation:

Other Questions
high divers use the height of the diving platform to calculate the speed at which they enter the water. The formula 5s- 3h = 12 models the diver's speed's (in miles per hour) and the height h (in feet) of the platform. The group given the treatment being studied during an experiment, such as a medication, fertilizer, or exposure to some other variable, is called the:_______ Question 20 of 24Which tool would a scientist use to study microscopic plants and animalsthat live in the ocean?A. A current meterOB. A submarineC. An autonomous underwater vehicleOD. A plankton net Converting ounces to grams. there are 28.35 grams in an ounce. a pancake recipe calls for 1 lb of flour. how many grams are in 1 lb of flour? The amount of heat transferred to a system can be measured in _________________. Select the graph of the solution. Click until the correct graph appears.|x| < 4 a boy weighs 90 pounds on earth but 34.5 pounds on mars how much does a 600 pound man weigh on mars Rearrange the formula c=4/a-b to make a the subject Describe the authors claim Which statement describes geographic conditions in North America when early peoplemigrated from Asia? Question 18 (2.5 points)Racism impliesdesegregationtolerancediscriminationsensitivity Calculate the percentage ionization in these amino acid side chains at the ph values specified: i. aspartate at ph 5.4 ii. glutamate at ph 11.8 iii. histidine at ph 8.0 In the past 20 years how many immigrants to America have come from Latin America and Asia Which part of the brain is responsible for thinking and planning? limbic system hypothalamus brain stem cerebral cortex The first public equity issue offered by a company is commonly referred to as a(n):________ Which instruction would the nurse provide a client prescribed oral extended-release ciprofloxacin therapy for aurinary tract infection? Emts are dispatched for a patient whose central venous catheter is malfunctioning. when they arrive and assess the patient, they find bleeding from the tubing attached to the line. the emts should? In ________ , the first step in the problem-solving process is to identify the components called objects and to determine how these objects interact with each other. < Question 11 of 27 >A car traveling 88.0 km/h on a straight road is 2500 m behind a truck traveling at 64.0 km/h.How much time t will it take the car to catch up with the truck?t = What is this expression in simplified form?Any help?