i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help. and dont tell me to get a computer.

Answers

Answer 1

Answer:

1 Broken or malfunctioning keyboard: A broken key in your keyboard or a malfunctioning keyboard can cause such issues.

2 Problematic Keyboard Drivers: Outdated or corrupted keyboard drivers may trigger actions that make your computer alt tab on its own.

3Problematic Graphics Drivers: Corrupted graphics drivers may bug the overlay, which is likely why your games keep alt tabbing.

4Virus Or Malware: Virus and malware are known to take over applications and make them behave wierdly. This can be one of those situations.

5 A Task is running in the background: A task may be running in the background while you are playing a game on fullscreen. This may bug the task window and make it alt tab every few seconds.

6Background applications and services: Similar to a task running in the background, other applications, and services running in the background can also get bugged and alt tab on their own.

7Corrupted system files and outdated Windows: Outdated Windows and corrupted system files are also known instigators for such issue.

have great day


Related Questions

Which key in is used in combination with another key to perform aspecific task

Answers

Answer:

control key

Explanation:

the control key modifies the function of the key with which it is pressed in combination

This one is also a little bit of Mathematics but it is for my Computers and technology class.

If you type 100 words per/minute but you have to write a 13,550 word document, your friend Jacob types 35 words per/minute and your friends has to type 5,540 words, and your friend Ella types 65 words per/minute and she has to type 9,450 words. Who is finishing first and how long does it take them to finish their documents?

Answers

Answer:

See below

Explanation:

Words / rate = time

13550 w  / 100 w/min  = 135.5 min  <====first finisher

5540 / 35                     = 158.3 min

9450 / 65                     = 145 . 4 min

Answer:

You

Explanation:

You have 2 hours and 15 minutes and 30 seconds  135.5

Jacob has 2 hours and 38 minutes  158.3

Ella has 2 hours and 25 minutes  145.38

Need this now!!
Write 10 python calculations using a variety of operations. Have a real-life purpose for each calculation.
For example, one calculation could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.

Sample code in a program:
​print("A field 30 feet wide and 40 feet long. Area (square feet): ", area)

Sample output:
​A field 30 feet wide and 40 feet long. Area (square feet): 120

Answers

Using the knowledge of computational language in python it is possible to write a code that could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.

Writting the code:

# Calculate Miles Per Gallon

print("This program calculates mpg.")

# Get miles driven from the user

miles_driven = input("Enter miles driven:")

# Convert text entered to a

# floating point number

miles_driven = float(miles_driven)

# Get gallons used from the user

gallons_used = input("Enter gallons used:")

# Convert text entered to a

# floating point number

gallons_used = float(gallons_used)

# Calculate and print the answer

mpg = miles_driven / gallons_used

print("Miles per gallon:", mpg)

See more about python at  brainly.com/question/18502436

#SPJ1

which statement is the best example of how society affects the use of technology

Answers

A statement which is the best example of how society affect the use of technology is that: A. Some people who are concerned about climate change get their power from solar or wind energy.

What is technology?

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life such as the use of solar energy as a source of electricity or power.

Generally speaking, various technologies are designed, developed and applied to many fields around the world such as the following;

Engineering.Environmental.Medicine.Information technology.Cybersecurity.

Additionally, the use of hydrocarbons such as fuel for the generation of electricity or power, gives rise to an emission of Green-house gases such as carbon, which increases the chance of global warming and by extension a climate change. Consequently, those who are concerned about this negative impact are likely to use other technology to get their power from solar or wind energy.

Read more on technology here: https://brainly.com/question/25110079

#SPJ1

Complete Question:

Which statement is the best example of how society affects the use of technology?

A. Some people who are concerned about climate change get their power from solar or wind energy.

B. Irrigation systems are used to deliver water to crops that grow in fields,

C. Solar panels can generate power in parts of the world where there is plenty of sun throughout the year.

D. Regions that are sunny most of the year have more farms than cold regions.​

Answer:

Explanation:

"The widespread adoption of smartphones has led to an increase in the use of mobile banking apps and a decrease in the use of physical bank branches."

This statement is the best example of how society affects the use of technology because it shows how changes in society (in this case, the widespread adoption of smartphones) can drive changes in the way technology is used. In this example, the increased use of smartphones has led to a shift in how people access banking services, with more people using mobile banking apps instead of physical bank branches. This is a clear example of how societal factors can drive changes in technology usage.

Some one please help me ​

Answers

It should be noted that:

the Cabling for 1000BASE-T Ethernet standards is RJ-45 Connector.the cable for ethernet standards 10GBase-SR is Copper for Fiber cabling. It must be an SPF+, multi-mode fiber cable with an 850 nm laser. This is the most often utilized cable in fiber-based 10 GbE networks. SR stands for "Short Range," and depending on the generation of MMF, it can run up to 400 m.The cable for WAN Link is CAT5e or CAT6 cable.The cable for ethernet standard 100base-t is an RJ-45 cable for physical linkage and supports segment lengths of up to 100 meters.

What are the Ethernet standards?

The IEEE Standard 802.3 Ethernet standard was created by the Institute of Electrical and Electronic Engineers (IEEE). This standard outlines how the pieces of an Ethernet network communicate with one another as well as the rules for creating an Ethernet network.

IEEE 802.3 is a standards body and a set of standards that define wired Ethernet's physical layer and data link layer media access control. The standards are developed by the Institute of Electrical and Electronics Engineers' working group.

Learn more about Ethernet Standards:
https://brainly.com/question/13267410
#SPJ1

Add the 3 program comments at the top of the program with the information needed:
Name:
Date:
Program:
Set appropriate variables for the maximum and minimum order amounts
Set an appropriate variable for the price per pound of 7.99
Get the order amount input and cast to a number and store it in a variable (Since it can contain decimals, what kind of number cast should you use?)
Write an if structure that compares the input value with the minimum and maximum values according to the creiteria below:
if over the maximum of 100 return a message indicating that
if under minimum of 0.25 return a message indicating that
if within the allowed range return a message with the calculated price rounded to 2 decimal places!
Test your program extensivel and compare with the example output below

Answers

C++:

#include <bits/stdc++.h>

typedef long double d;

int main(int argc, char* argv[]) {

 d a=0.25,b=100,c;

 std::cout << "Enter amount: "; std::cin>>c;

 if(c>b) std::cout << "Huge amount!";

 else if(c<a) std::cout << "Insufficient amount!";

 else std::cout << "The price is: $" << std::ceil((c*7.99)*100.0)/100.0 << std::endl;

 return 0;

}

For Python code, check the attachments.

what is a network card?​

Answers

Network is a device (card) which can be pugged in the on the Mothrtboard, then you can simply insert your Lan Cable innthe network card which is being plugged in on motherboard !

Can you help me solve this with the proper code?

Answers

def __init__(self,num_mins,num_messages):

   self.num_mins=0

   self.num_messages=0

When will this program stop calling the playLevel function?

Answers

Answer:

D

Explanation:

when the life value = 0 it means the program will stop

You see a picture of three people having fun in an IG post. Beneath the photo is a text about a prty. You wrongly assume this picture was taken at a prty when it was actually taken during a family dinner. This type of misunderstanding is an example of

Answers

From the information given this type of misunderstanding is an example of: Communication Barrier.

What are communication Barriers?

Communication obstacles prohibit us from accurately receiving and accepting the messages used by others to transmit their information, thoughts, and ideas. Communication difficulties include information overload, selective perceptions, workplace gossip, semantics, gender disparities, and so on.

It is to be noted that the Assumption that you comprehend what the other person is saying is one of the most significant communication barriers. People frequently make assumptions based on their own experiences and interpretations. You don't always know you're not talking about the same subject.

Learn more about Communication Barrier:
https://brainly.com/question/8588667
#SPJ1

Answer:

error, i think.

Technology has seeped into society from all different perspectives. Looking at how it has affected us from all different areas, what are two ways in which technology has had an impact on society from a positive viewpoint?
Looking at the following areas of IT, what types of job processes have been enhanced by the existence of these particular areas? For example, interoffice envelopes have been replaced by the use of e-mail. Choose at least two types of processes, state what they are, and how they have been enhanced by that particular area of IT.
Network administration
Security administration
Database administration
Software development
Multimedia development

Answers

A better use of time is made possible through productivity apps.Access to biometric gadgets, food management software, and exercise routines easily leads to improved health.communication with friends and family is simpler and less expensive.more employment opportunities as a result of remote working.

How has technology had a positive impact on society?

Routine chores can be automated thanks to technology, which results in fewer and less fulfilling middle-skill occupations.In contrast, it enhances social and innovative tasks by generating more engaging low- and high-skill occupations.Polarization results from this, "hollowing out" demand for middle-skill workers and widening the wage gap. An organization's network is managed, watched over, kept safe, and serviced through network management.However, based on an organization's size and structure, specific activities and procedures could change. Other ways technology is perceived to benefit society include greater information and understanding, advancements in business and employment opportunities, and a more interconnected globe as a result of globalization.The majority of Americans—only 8%—believe that technology has a detrimental impact on society. Technology's beneficial effects on societyTechnology development and acceptance have aided communities in increasing productivity, expanding access to services, and enhancing general well-being.

        To learn more about Technology refer

        https://brainly.com/question/1162014

        #SPJ1

A while loop reads characters from input. Write an expression that executes the while loop until character 's' is read.

Answers

An expression that executes the while loop until character 's' is read is given below:



The Expression

// Takes character input, tallies periods, stops on dollar sign

#include <iostream>

using namespace std;

int main() {

   char i; // input received

   int j = 0; // counter for # of periods

   cout << "This program will accept single-character entries and report the number of periods you've entered.\n";

   for (;;) {

       do {

           cout << "Please enter a single character, using $ to stop: ";

           cin >> i;

           if(i == '.')

               j++;

       } while(i != '$');

   if(i == '$')

       cout << "Total number of periods entered is " < < j < < " .";

       break;

   }

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Please help

When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.

Answers

You can use proper grammar and punctuation to maintain a neutral tone. Also, justify your opinions instead of arguing pointlessly.

In addition, you should address others by their appropriate title and name. Sarcasm should be avoided at all costs - it can be easily misinterpreted.

answer in java.
Write a class named TestScores. The class constructor should accept an array of test scores as its
argument. You will need to do a deep copy of the array, don’t just copy the address of the array. The
class should have a method that returns the average of the test scores. If any test score in the array is
negative or greater than 100, the class should throw an IllegalArgumentException.
Write an exception class named InvalidTestScore. Create a setScores() method in TestScores which
accepts an array of test scores. Validate each item in the array and if any test score in the array is
negative or greater than 100, the class should throw an InvalidTestScore Exception.
Next create another method in TestScore called getScoresFromFile(). This method should open a file
that you created in Notepad and it should contain a list of test scores, some valid and others not. Read
in each of these test scores and store into an array. The first entry in the file should be the number of
scores that should be read. This number should be used to properly create the test score array. The
method should properly handle the potential FileNotFoundException. If file does not exist the program
should stop and exit with your own error message. As each score is read from the file (use nextInt())
throw either an IllegalArgumentException or an InvalidTestScore if the number read is not between 1
and 100 inclusive. You also need to handle an InputMismatchException. This means that either a
string was encountered or a floating-point number was encountered while reading the file. When this
happens issue an error message, but continue processing the file until you reach end of file. Note:
When this happens the entry you will add to the test score array will contain 0. How you accomplish
this is up to you. Feel free to discuss with your instructor.
Demonstrate all this functionality in a main() program

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that a class named TestScores. The class constructor should accept an array of test scores as its argument.

Writting the code:

import java.util.Scanner;

class TestScores

{

int scores[];

TestScores(int array[])

{

scores=new int[array.length];

for(int i=0;i<array.length;i++)

{

scores[i]=array[i];

}

}

double calAverage()

{

double avg;

int sum=0;

for(int i=0;i<scores.length;i++)

{

sum=sum+scores[i];

}

avg=sum/scores.length;

return avg;

}

}

class TestDriver

{

public static void main(String args[])

{

try

{

Scanner s=new Scanner(System.in);

int count;

System.out.print("Enter number of test scores : ");

count=s.nextInt();

int array[]=new int[count];

System.out.println("\nEnter test scores ");

for(int i=0;i<count;i++)

{

array[i]=s.nextInt();

if(array[i]<0||array[i]>100)

{

throw new IllegalArgumentException("Test scores must have a value less than 100 and greater than 0.");

}

}

TestScores ts=new TestScores(array);

double avg=ts.calAverage();

System.out.println("\n Test Scores average is : "+avg);

}catch(IllegalArgumentException e)

{

System.out.println(e.getMessage());

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

For each of the following questions, be sure to choose not only the correct answer but the *canonically correct* answer. There may be one or more answers which are correct, but some of those answers may not be conventional use.



Question 1 (1 point)
Which of the following will allocate a buffer suitable for 4 integers?

Question 1 options:

int *ptr = (int *)malloc(sizeof(int) * 4);
int *ptr = (int * 4)malloc(sizeof(int));
int *ptr = (int *)malloc(4);
int *ptr = malloc[4];





Question 2 (1 point)
For the following program, which satement best fits as a parameter for the printf() call?

#include

typedef union u_foo {
int iValue;
float fValue;
} Foo;

void main(int argc, char **argv) {
Foo foo;
foo.iValue = 42;
printf("The value of foo is %d\n", );
}

Question 2 options:

foo.fValue
foo.iValue
(&foo)->iValue
(*(&foo)).iValue





Question 3 (1 point)
In the following makefile, what is the target `foo` dependent upon?

all: foo

foo: foo.c
gcc -o foo foo.c bar.c

bar: bar.c
gcc -o bar bar.c

clean:
rm foo bar

Question 3 options:

foo.c and bar.c
bar
all
foo.c





Question 4 (1 point)
For the following header file, which statement best declares a function that takes 2 integer parameters?

#ifndef SOMETHING__H
#define SOMETHING__H



#endif // SOMETHING__H

Question 4 options:

int foo(int a, int b);
extern int foo(int a, int b);
extern int foo(int *a, int *b);
static int foo(int a, int b);





Question 5 (1 point)
For the following program, what line is best applied to release the allocated memory?

#include

int main(int argc, char **argv) {
char *buf = malloc(32);
// assume buf is used appropriately here

}

Question 5 options:

release(buf);
free(buf);
free(32);
delete(buf);





Question 6 (1 point)
In the following program, which statement will properly copy the contents of `foo` to `bar`?

#include
#include
#include

int main(int argc, char **argv) {
char *foo = "This is a statement of intent";
char bar[16];
memset(bar, 0, 16);

}

Question 6 options:

memcpy(bar, foo, 15);
strncpy(bar, foo, 16);
strcpy(bar, foo);
strcpy(foo, bar);





Question 7 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?

#include

typedef struct t_foo {
int value;
} Foo;

void main(int argc, char **argv) {
Foo foo = { 42 };
Foo *pFoo = &foo;
printf("The value of foo is %d\n", );
}

Question 7 options:

pFoo->value
*pFoo->value
pFoo.value
(*pFoo).value





Question 8 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?

#include

typedef struct t_foo {
int value;
} Foo;

void main(int argc, char **argv) {
Foo foo = { 42 };
printf("The value of foo is %d\n", );
}

Question 8 options:

(*foo).value
foo->value
*foo.value
foo.value





Question 9 (1 point)
For the following header file, which line of code is missing?

#ifndef SOMETHING__H

extern int foo;

#endif

Question 9 options:

#define SOMETHING__H
// SOMETHING__H
static int foo();
typedef foo something;





Question 10 (1 point)
What is the size in bytes of the following structure?

struct t_foo {
int bar: 6;
int baz: 5;
int bat: 2;
};

Question 10 options:

12
13
16
2





Question 11 (1 point)
For the following program, what is the best way to get a block of memory on the heap for the variable `foo`?

#include

typedef struct t_foo {
int value;
} Foo;

void main(int argc, char **argv) {
Foo *foo = ;
}

Question 11 options:

malloc(sizeof(t_foo))
malloc(8)
{ 42 }
malloc(sizeof(Foo))





Question 12 (1 point)
For the following program, which line of code will place the contents of the file into the memory for the variable `buf`?

#include

void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
int fsize = // ASSUME WE GET THE SIZE OF THE FILE HERE
char buf[128];

// MORE PROGRAM CODE HERE
}

Question 12 options:

fread(fp, buf, fsize)
fread(buf, fp, fsize, 1)
fread(fp, fsize, buf, 1)
fread(buf, fsize, 1, fp)





Question 13 (1 point)
For the following program, which line of code will get the size of the file in question?

#include

void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
fseek(fp, 0, SEEK_END);

fseek(fp, 0, SEEK_SET);
}

Question 13 options:

int fsize = ftell(fp);
int fsize = fp.position;
int fsize = ftell(&fp);
int fsize = fread(fp, 1);





Question 14 (1 point)
For the following program, which is the best type for the variable `next`?

#include

typedef struct t_foo {
int value;
next;
} Foo;

void main(int argc, char **argv) {
Foo foo;
}

Question 14 options:

struct t_foo
Foo
struct t_foo*
Foo *





Question 15 (1 point)
In the following program, what is the value of `*ptr`?

#include

int main(int argc, char **argv) {
int foo[] = { 0, 1, 2, 3, 4 };
int *ptr = &foo;

do {
++ptr;
} while (!ptr);
}

Question 15 options:

foo[1]
2
0
1

Answers

Answer:

12

Explanation:

enters integral values

factors to consider when selecting a requirement gathering method in software requirements

Answers

Answer:

They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity

They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity.

What is software development?

A set of computer science activities dedicated to the process of creating, designing, deploying, and supporting software is referred to as software development.

The set of instructions or programs that tell a computer what to do is known as software. It is hardware-independent and allows computers to be programmed.

Domain experience, platform experience, programming language experience, problem solving ability, educational background are the suggest five factors that might be considered when selecting people for a software development team.

Operating systems, disk management, utilities, hardware management, and other operational necessities are provided by system software.Text editors, compilers, liners, debuers, and other code creation tools are provided by programming software.

Therefore, They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity.

Learn more about disaster on:

https://brainly.com/question/13154257

#SPJ2

Which of the following is an example of a ‘runtime error’? I. Karel crashing into a wall II. Leaving a semicolon off the end of a command III. Using the wrong syntax in an if/else statement IV. Not closing all open brackets

Answers

An example of a ‘runtime error’ is: I. Karel crashing into a wall.

What is a logical error?

A logical error simply refers to a type of error which typically cause a software program to produce erroneous results, and thereby, leading to a runtime error.

What is a runtime error?

In Computer technology, a runtime error can be defined as a type of error that is associated with either a software or hardware, which eventually prevents it from running successfully.

In conclusion, crashing into a wall is a good example of a runtime error because it impedes your movement or ability to advance forward.

Read more on errors here: brainly.com/question/18497347

#SPJ1

Drag the tiles to the correct boxes to complete the pairs.
Match each task to the type of control structure represents.
switch case
sequence
repetition
if else
assembling structure step by step
choosing between two subjects
selecting a color out of five colors
testing a product until free of bugs

Answers

Answer:

A structure choosing between two subjects - Switch case sequence

Selecting a color out of five colors - If else assembling

Testing a product until free of bugs - Repetition

(a) What are binary digits?​

Answers

Answer: A binary digit, or bit, is the smallest unit of information in a computer.

Explanation:

The value of a bit is typically stored above or below an allocated level of an electrical charge within a capacitor inside a memory module. For devices that use positive logic, value 1 (true value or high) is positive voltage relative to the electrical ground and value 0 (false value or low) is 0 voltage.

https://www.techopedia.com/definition/2678/binary-digit-bit

How many sections are contained in the Aspire test?
A. five
B. six
C. three
D. four
SUBMIT

Answers

How many sections are contained in the Aspire test?

A. five

Five - English, mathematics, reading, science, and writing.

Write an algorithm that determines the square root of a number​

Answers

The Square Root Algorithm

Pairing: Starting from the right, group the digits of the given number in pairs of two. Initial guess: Start with the leftmost group.Note down the number obtained from the previous step at the top. Now, bring down the next group's digits next to the remainder. Hit and trial:

What is Square Root Algorithm?

The way the square root technique is set up, we can calculate the square root of a number as (X + R)2. It is evident that (X + R) is this number's square root. R denotes the remaining portion of the number after the approximation, and X denotes the current square root approximation.

Using the square root function, you can convert rational numbers into algebraic numbers (which are a subset of rational numbers). The Euclidean norm (and distance) and generalisations like Hilbert spaces both depend on the square root of a nonnegative number.

TO learn more about square root visit:

https://brainly.com/question/3120622

#SPJ10

Steps of
Steps of Diagram and remove cables inside a computer

Answers

Based on the image of the Steps of  Diagram and remove cables inside a computer, the  arrangement in the right order are  5-2-3-6-1-4:

5 Back up data.

2. Press and hold power button.

3 Power down system .

6 Unplug computer.

1. Open case cover Instruction.

4 Clip ESD strap to case.

What is the computer cable removal about?

The first thing to do is to disconnect the computer's power line from the wall and the power supply, then turn off the device's power. Find every screw holding the side panels to the computer's rear. For the case, there could be one to six screws. From the case, remove the side panels.

Make sure to put on a wrist strap that is antistatic. Connect the conductor's other end to the wristband. Attach the conductor's opposite end with a clip to a metal, unpainted portion of the case.

Lastly, also find the power source, then carefully unplug any motherboard power connections. Any case fans, video cards, and any other connections to which the power cords were attached should be disconnected. Find and remove each and every screw holding the power source.

Learn more about computer cables from

https://brainly.com/question/898009
#SPJ1

please i need help asap i will mark brainlest
Which of the following are notes which can be electronically entered into documents without changing the content of the document?
Question 1 options:

Comparisons


Comments


Changes


Reviews

Answers

Comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

What are the characteristics of word documents?

The characteristics of word documents are as follows:

It allows a user to construct professional write-ups.It has editing and formatting tools that modify the existing documents.It authorizes the user to insert charts, tables, diagrams, etc. within the document to make it more attractive.

In this question, the significance of a comment is better understood by the fact that it represents the notes a reader can normally insert within the existing document in order to modify or highlight the required text in the document.

Therefore, comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.

To learn more about Documents, refer to the link:

https://brainly.com/question/1218796

#SPJ1

hello bbmb vhnvjv jhgvjjgvkv

Answers

Hi how is your day.

I need this now!

Which term best describes a network device?

A server running an email application

A node on the network whose purpose is to control or direct network traffic

A tablet streaming a movie

A computing device using a network

Answers

I believe it is the second option

Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware

Answers

Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware: True.

What is a malware?

A malware simply refers to any type of software program or file that is designed and developed to be intentionally harmful to the host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan.

The examples of malware.

In Computer technology, some examples of malware include the following:

VirusesTrojansZombiesRootkitWormsAdwareSpyware

In conclusion, we can reasonably infer and logically deduce that a malware is designed and developed to cause harm to a digital host.

Read more on malware here: brainly.com/question/17209742

#SPJ1

Complete Question:

Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware. True or False

4. Make up your own here!

a. What hardware tool would you suggest for his computing system? Include an
explanation and the cost.
b. What software program would you suggest? Include an explanation and the cost.
c. What operating system might you suggest (Mac, Windows, iOS, Android, etc) and why?

Answers

Answer:

tool that I need is screw driver cause it's helpful

What is the output of this program? Assume the user enters 3, 6, and 11.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fitAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Output:

Answers

Answer:

14.0

Explanation:

Que tecnología son afectadas por digital trust?

Answers

Así que primero tenemos que ver las consecuencias de la pregunta que le hiciste a la gente aquí. No sabemos el idioma que hablas, pero según lo que sé, jamal y tyrone escaparon de los campos anoche.

Estas 4 tecnologías de confianza digital monitoreo basado en IA, confianza de datos, cadena de bloques y tecnologías cuánticas pueden ser útiles cuando se usan en conjunto, ayudándolo a mejorar la reputación de su marca al proteger sus datos, además de mejorar y optimizar sus procesos.

(Monitoreo basado en IA, fideicomisos de datos, blockchain y tecnologías cuánticas)

An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?

Answers

This scenario is describing attack of:

Computer BotsCommand & Control

What are computer bots?

A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.

Which types of bots are there?

Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.

How do computer bots work?

A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.

What is computer bots malware?

Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

To learn more about computer bots visit:

https://brainly.com/question/28540266

#SPJ10

Answer:  (D) Cross-site scripting (XSS)

Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Other Questions
Let f be a differentiable function with f(2)=-3 and f'(2)=-4. The next model of a sports car will cost 3.1% less than the current model. The current model cost $54,000. How much will the price decrease in dollars? What will be the price of the next model? Tracy opened a savings account and deposited $600.00. The account earns 4% interest,compounded annually. If she wants to use the money to buy a new bicycle in 3 years, howmuch will she be able to spend on the bike?Round your answer to the nearest cent. For y = 10*0.5^x , doesthis model exponential growth or decay? Explain how you know. a cash payment made by a firm to its owners in the normal course of business is called a: what is the most likely explanation for the expression of responses related to pleiotropy? What does the phrase deriving their just powers from the consent of the governed mean in this context? Are any of the figures B, C, Or D scales copies for figure A. Explain how you know Tu _____de Boston. which word is used for the blank. soy or eres when describing somatic symptom disorder to a group of nurses, which would the nurse include as a significant obstacle in providing psychiatric care for clients with that disorder? how could the approval of crispr for treatment of hd potentially impact the way future generations see gene editing? Solve: 4,557 22 A 27332 B 222073 C 207422 D 207322plssss i really need a answer fast!! How do I Simplify (6 4i) ( +5)? Name the weather in which days are shorter, nights are longer and the tilt is away from the sun.(I dont know why its said like this but help..) What kind of crop was grown in Jericho? If the following function is continuous then what is the value of b? Write two to three sentences explaining Melba Beals's purpose for writing Warriors Don't Cry. Consider using details about the central ideas, mood, or historical context to support your conclusion Find the equation of the line in slope intercept form that passes through the point with the given slope. Simplify your answer.Point (0, 8); Slope = 8 Read the lines from Between Words.Love,The moon is between clouds,And were between wordsThat could deepenBut never arrive.Like this walk. We could goUnder trees and moons,With the stars tearingLike mouths in the night sky,And well never arrive.Thats the point. Which statement is a theme in this excerpt?Life is a long and unpredictable journey.It is important to have a connection to nature.Communication between people can be difficult.The natural world can sometimes be threatening. "Court packing" refers to...