E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use

Answers

Answer 1
D or b
I’m pretty sure sorry if I’m wrong
Answer 2

E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

As we know,

You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.

Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2


Related Questions

wordList is a list of words that currently contains the values ["tree", "rock", "air"]
Which of the following lines will result in the list containing the values ["air", "rock", "air"]
A. wordList[0] = wordList[2]
B. wordList[2] = wordList[O]
C.insertitem(wordList, O, "air")
D. removeltem(wordList,0)

Answers

Answer:

A. wordList[0] = wordList[2]

Explanation:

Required

Which line would give ["air", "rock", "air"]

From the question, we have that:

wordList =  ["tree", "rock", "air"]

which means that:

wordList[0] = "tree"

wordList[1] = "rock"

wordList[2] = "air"

Analyzing the options.

A. wordList[0] = wordList[2]

This will assign the item in wordList[2] to wordList[0].

and the result would be

So:

wordList[0] = "tree"

would change to

wordList[0] = "air"

The new content of wordList would then be ["air", "rock", "air"]

Option (A) answers the question

The list variable wordList contains three string values, Hence, to obtain the list, ["air", "rock", "air"], the lines wordList[0] = wordList[2] would be used.

List values are indexed from 0 ; hence, tree = index 0 ; rock = index 1 ; air = index 2

To assign the the string "tree" to index 0, then wordList[2] is assigned to wordList[0].

wordList[0] is now "air"

Hence, the required line of code would be wordList[0] = wordList[2]

Learn more :https://brainly.com/question/19117781

what are the characteristics of 1st generation computers​

Answers

Answer:

Used vacuum tubes for circuitry.

Electron emitting metal in vacuum tubes burned out easily.

Used magnetic drums for memory.

Were huge, slow, expensive, and many times undependable.

Were expensive to operate.

Were power hungry.

Explanation:

 

Answer:

Characteristics of first generation computers:

Explanation:

1)First generation computers used vacuum tubes.

2)Speed was slow and memory was very small.

3)They were huge in size taking up entire room.

4)They consumed a lot of power and generated so much heat.

5)Machine language was used in these computers.

6)Output was obtained on printouts through electric typewriter.

7)Input was based on punched cards.

8)First generation computers were expensive and unreliable.

1) ¡(X && Y )&& !X || W && Z

2) W || !(X || Z && Y)

3) !X || !Y || Z && X && !Y

4) X || Y || X && !Z && !Y

Answers

Answer:

???

Explanation:

Answer:

uhh

Explanation:

you spammed random stuff?

Which of these are steps in the testing cycle? Check all of the boxes that apply.

testing the fixed code

releasing debugging version

fixing the error

reproducing and diagnosing the error

Answers

Answer:

A,C and D

Explanation: You're welcome

Answer:

A and D

Explanation:

Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the customer via email to let them know of the new ship date.


A)Negative



B)Positive

Answers

Answer:

positive

Explanation:

it shows good customer service

what are the advantages of using a folder?​

Answers

Answer:

1. easy access to files

2. better organization

Explanation:

jibran has made a presentation on save environment for a competition. his teacher suggested some changes.which view should be using following changes​

Answers

Answer:

Jibran has set up five slides in his new presentation and is ready to enter some text. He wants to focus on entering text without having to think about other PowerPoint elements such as graphics, pictures, sound, and animation. The best method for Jibran to enter text is by using which feature of Microsoft PowerPoint?

3. You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
b. Buy the apps a second time from your tablet.
c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps.
d. Call Google support and ask them to merge the two Google accounts into one.

Answers

Answer:

a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.

Explanation:

Explain
the three types of periodic
maintanance. .​

Answers

Answer:

poop i think

Explanation:

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? How can we convert data that is written on a device that supports only sequential access to a device that only support direct access method?

Answers

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. eparaml width the width of the cuboid eparam2 height the height of the cuboid eparam3 length the length of the cuboid ereturn the area of the cuboid double area(double width, double height, double length) double result - width +height 1ength; return result: A. The comments are adequate to describe the function. B. The lines need to end with semicolons like other C++ statements. C. The parameters should be described more completely. D. The eparaml, eparam2, eparam3 should be just eparam.

Answers

Answer:

A. The comments are adequate to describe the function.

Explanation:

C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements

The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.

what is the norm that psychoanalysis of Freud deviates?

Answers

Answer:

Freud deviates from the norm of current mainstream psychology which has more or less lost its way - if it ever had one - under the influence of the same pressures which produce our dysfunctional politics and our troubled societies at large (technological change, globalisation, and so on).

Explanation:

Creds to Quora

What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical address mapping process? Explain how the logical-physical address mapping logic works using an inverted page table. When does the MMU detect page-fault? Explain four of the main steps for resolving page faults.

Answers

Answer:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

Explanation:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

do you think your future career will continue to become more and more reliant on computers and is it a good thing to depend so fully on computers to help with work skills and careers​

Answers

There are good and bad, some people rely on computers, and some people need him to help them find information.

I personally think many future careers will continue to become more reliant on computers, however maybe not every single one.

I wouldn’t say it’s a good thing to depend so fully on computers but I also wouldn’t say it’s a bad thing either.

You probably shouldn’t rely on a computer 100% because it’s essentially important to know how things work on your own rather than depending on a computer all the time. While it can be a good thing. Like cashiers can print out a receipt rather than writing it out and consuming more time.

For the function below, which variables have the same scope?

def square(numA, numB):

return numA ** numB

base = 5
power = 2
answer = square (base,power)
print(answer)


numA and power

power and base

numB and power

base and numA

Answers

Answer:

numB and power

Explanation:

Correct answer edge 2020

The variables have the same scope for the given function is power and base. The correct option is B.

What are variables?

A variable in mathematics is a symbol and placeholder for any mathematical object. A variable can specifically represent a number, a vector, a matrix, a function, a function's argument, a set, or an element of a set.

A variable in computer programming is an abstract storage location with an associated symbolic name that contains some known or unknown quantity of information referred to as a value; or, to put it another way, a variable is a named container for a specific set of bits or type of data.

Because power and base are declared in the same container, they have the same scope. Because they are not present in a function, their scope is said to be global.

Thus, the correct option is B.

For more details regarding variables, visit:

https://brainly.com/question/17344045

#SPJ2

Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)

Answers

Answer:

The correct option for accessing the value in sarray[3] is : d) *(sptr+3)

Explanation:

a) *sptr[*3]  is wrong option because its syntax is not right it will give errors.

b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].

c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.

d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer

Write in Java:
Given a long integer representing a 10-digit phone number, output the area code, prefix, and line number using the format (800) 555-1212.

Ex: If the input is:
8005551212

the output is:
(800) 555-1212

Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72.

Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction).

For simplicity, assume any part starts with a non-zero digit. So 0119998888 is not allowed.

LabProgram.java:

import java.util.Scanner;

public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
long phoneNumber;
// Add more variables as needed

phoneNumber = scnr.nextLong();

/* Type your code here. */
}
}

Answers

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

   Scanner scnr = new Scanner(System.in);

   long phoneNumber;

   phoneNumber = scnr.nextLong();

   long areaCode =  phoneNumber/10000000;

   long prefix = (phoneNumber/10000)%1000;

   long lineNumber = phoneNumber%10000;

   System.out.println("("+areaCode+")"+prefix+"-"+lineNumber);

}

}

I hope this helps!

For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (System.in); 2. int max =

Answers

Answer:

The answer is "Option d".

Explanation:

Please find the complete question in the attached file.

What computer part it this? Explain to get brainliest. People that don't explain, won't get it, but will get a thanks + a 5 star rate.

Answers

Answer:

That is a motherboard, a circuit board containing the main components (CPU, RAM, etc) of a computer. It contains connectors in which other circuit boards can be slotted into.

Explanation:

A motherboard is a specialized circuit board (a thin board containing a electrical circuit) used for containing major components of a computer and allowing the parts to be used in conjunction with each other. This is why you'll find a motherboard in a large variety of computers, from phones, to PC's and laptops.

Answer: Motherboard.

Explanation: it's the backbone of a computer, it ties all the computers components together.

do you think the governmentshould allocate moremoney to HIV/AIDS orphans​

Answers

Answer:

Abstract

Objective Through a descriptive study, we determined the factors that influence the decision-making process for allocating funds to HIV/AIDS prevention and treatment programmes, and the extent to which formal decision tools are used in the municipality of KwaDukuza, South Africa.

Methods We conducted 35 key informant interviews in KwaDukuza. The interview questions addressed specific resource allocation issues while allowing respondents to speak openly about the complexities of the HIV/AIDS resource allocation process.

Originally, Java was used to create similar apps as what other language?
Perl
Python
CSS
Javascript

Answers

Answer:

Python

Explanation:

Took the test

Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.

What are computer languages?

The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.

Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.

Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.

Therefore, the correct option is b. Python.

To learn more about computer languages, refer to the below link:

https://brainly.com/question/14523217

#SPJ2

A new version of your operating system is released with several changes made to the transport layer protocols. Specifically, TCP has been removed completely but UDP was not changed. What specific changes must be made to your application to accomodate these changes?

Answers

Answer:

Throughout the description section down, the overview and per the instance.

Explanation:

Throughout terms of communicating and maintaining a link between the application as well as the network, TCP protocols were essential. The program would not be linked or activated if the TCP has indeed been fully disabled. The essential TCP protocol that enables the application to be linked from over network become HTTP as well as HTTPS. Almost all of the significant protocols needed to operate some programs are based primarily on TCP protocols. Besides, as SSH would not operate as a TCP protocol, the OS would not be remotely linked.

Therefore, that would also make it impossible for all the administrators to operate upon this system.

Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2​

Answers

Python

def getResults():

   radius = float(input())

   pi = 3.1415

   volume = 4/3 * pi * radius ** 3

   surfaceArea = 4*pi * radius ** 2.0

   print (volume)

   print (surfaceArea)

getResults()

C#:

       public static void Main(string[] args)

       {

           getResults(Convert.ToDouble(Console.ReadLine()));  

       }

       public static double[] getResults(double radius)

       {

           double radiusObj = radius;

           double volume = 1.33333333333 * Math.PI * Math.Pow(radiusObj, 3);

           double surfaceArea = 4 * Math.PI * Math.Pow(radiusObj, 2) ;

           double[] surfaceAndVolume = { volume, surfaceArea };

           Console.WriteLine(volume.ToString());

           Console.WriteLine(surfaceArea.ToString());

           return surfaceAndVolume;

       }

Java:

public static void main(String[] args)

   {

       Scanner  scanner = new Scanner(System.in);

       getResults(scanner.nextDouble());

   }

   public static double[] getResults(double radius)

   {

       double radiusObj = radius;

       double volume = 1.33333333333 * Math.PI * Math.pow(radiusObj, 3);

       double surfaceArea = 4 * Math.PI * Math.pow(radiusObj, 2) ;

       double[] surfaceAndVolume = { volume, surfaceArea };

       System.out.println(volume);

       System.out.println(surfaceArea);

       return surfaceAndVolume;

   }

Is this right? I’m not sure

Answers

Yeah indeed it is. Good job!!

what is the advantages of your solutions ​

Answers

Answer:

One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.

Explanation:

Write a program that computes the minimum, maximum, average, median and standard deviation of the population over time for a borough (entered by the user). Your program should assume that the NYC historical population data file, nycHistPop.csv is in the same directory.

Answers

Answer:

import pandas as pd

df = pd.read_csv('nycHistPop_csv', skiprows=5)

NY_region = list(df.columns[1: -1])

select_region = input("Enter region: ")_capitalize()

if select_region in NY_region:

   pass

else:

   raise("Region must be in New york")

def pop(location):

   # or used describe() to replace all like: print(df[location]_describe())

   print(df[location]_min())

   print(df[location]_max())

   print(df[location]_mean())

   print(df[location]_median())

   print(df[location]_td())

pop(select_region)

Explanation:

Pandas is a python packet that combines the power of numpy and matplotlib used for data manipulation. It is good for working with tables that are converted to dataframes.

The nycHistPop_csv file is read to the code to a dataframe called "df", then the user input and the function "pop" is used to automatically generate the statistics of a given region.

Does anyone have any Edge(nuity) tips? Like how to skip videos and such.

Answers

Answer:

yes

Explanation:

it is quite easy chat me up and i will give u the link

2. Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange?
a. Cope the files to an SD card and move the SD card to each device.
b. Drop the files in OneDrive and share notebooks with each other.
c. Send a text to each other with the files attached.
d. Transfer the files through an AirDrop connection.

Answers

Answer:

d. Transfer the files through an AirDrop connection.

Explanation:

I feel like im not sure 100%

But i hope it helps!

HAPPY THXGIVING!

Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None

Answers

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

Other Questions
There are 14 teams in a basketball league.Each team plays every other team twiceduring the season.a) Suppose that you want to determinehow many games, in total, are played.Suggest a simpler problem that youcould solve first.b) How many games, in total, are playedduring the season? Which of the following occurs when one object moves around another central object?A. SpinB. RotationC. ReboundD. Force Help ASAP yes or no explanation The moleculefound in paper is almost identical to thecarbohydrate molecule found in mashedpotatoes.glycogenchitincellulose En el siguiente diagrama, Midtown se encuentra exactamente a mitad de camino entre Uptown y Downtown. Cul es la distancia entre Midtown y Lower East Side?A-2.6 kmB-1.5 kmC-2.1 kmD-90 grados A potter's wheel is a uniform disk of mass of 10.0 kg and radius 20.0 cm. A 2.0-kg lump of clay, roughly cylindrical with radius 3.0 cm, is placed at the center of the wheel. The wheel initially rotates at 30.0 rev/min. The clay then flattens into a disk of radius 8.0 cm. What is the final angular speed of the wheel?a. 29.6 rev/min b. 29.2 rev/min c. 30.8 rev/min d. 30.4 rev/min e. 30.0 rev/min what is downpayment? 2.4x + 4.6x = 28 Could someone help me with this problem I need it. Twice the sum of a number and five is equal to six You are interviewing a new member of the psychology department for the university newspaper. The faculty member states, "Psychology has historically devoted too much attention to pathology, weakness, and suffering." This faculty members views are MOST similar to the views held by a mass of 25kg on a ramp at an angle of inclination 30 degrees to the horizontal, is oulled with a force of 75 kg an angle of 20 degrees to the ramp what is the frictional force if it is pulled up the ramp at constant speed 30 POINTS! PLEASE HELP WITH THIS QUESTION! Self-portraits are typically done by looking at a picture of yourself or by looking in the mirror.TrueFalse What is the slope of (10, 10) and (2, 1). Can anyone help me ? Find the values of x and y. Line v has an equation of y=10/7x + 8. Line W is perpendicular to line v and passes through (-7,4). What is an equation of line w? Need some help with this question!! Into a mixed number btw. Marcos talks to his grandfather in Alabama for about 95 minutes per month about how long does her talk each day on average? (Hint: use 1 month=30 days) How are graphs used to represent and analyze acceleration? please help!