More than 80% of all computer viruses are caused by macro viruses. What programs are most likely affected by a macro virus?.

Answers

Answer 1

The programs most likely affected by a macro virus are Microsoft word and Microsoft excel.

Macro viruses are a type of computer virus written in the same macro language as software programs, such as Microsoft word and Microsoft excel. They are more targeted and difficult to detect than other more general and common types of computer viruses because they are specifically designed to infect the user's documents.

Macro viruses run within applications and are often spread through phishing emails.

Once the macro virus spreads in a computer, it has the capability to corrupt the data or information and can also delete any of the contents of the storage devices. This type of virus can also alter Microsoft excel or word files or generate new files without the user's knowledge about it.

To learn more about the macro virus, click here:

https://brainly.com/question/9852117

#SPJ4


Related Questions

4) Which of the following computers is the fast and expensive computer? a) Mini Computer b) Super Computer c) Main frame d) desktop computer​

Answers

Answer: Supercomputers are the computers which are the fastest and they are also very expensive

Answer:

Super Computer

Explanation:

In a linear programming problem, the objective function and the constraints must be linear functions of the decision variables. True or false?.

Answers

It is true that the objective function and the restrictions in a linear programming problem must be linear functions of the choice variables.

When the needs of a mathematical model are represented by linear relationships, the optimal result can be obtained using a technique known as linear programming (LP), sometimes known as linear optimization. A particular type of mathematical programming is linear programming.

Formally speaking, linear programming is a method for optimizing a linear objective function under the restrictions of linear equality and linear inequality. Convex polytopes, a set defined as the intersection of a finite number of half spaces, each of which is determined by a linear inequality, make up its viable region.

Learn more about linear programming https://brainly.com/question/14309521

#SPJ4

In a typical hospital cdm layout, what do three asterisks (***) indicate regarding these services?

Answers

In a typical hospital CDM layout, the three asterisks (***) indicate that you do not have a CPT®/HCPCS Level II code built into the CDM.

Depending on the facility, some services, including surgeries, are dynamically coded (hand-entered) on a case-by-case basis and reviewed quarterly, semiannually, or yearly.

For the purpose of compliant and effective billing, reimbursement, and data gathering, hospitals may have a task force dedicated to the CDM or a single person in charge of keeping accurate data within the CDM. The duties of the CDM task force include:

At least once per year, Continually update as new practices or supplies are added to the hospital's service offering, Review and uphold payer data (bulletins, transmittals), and depending on that data, make CDM modifications.

Learn more about hospital CDM here:

https://brainly.com/question/13523148?referrer=searchResults

#SPJ4

The ipv4 network host can communicate with other local hosts but fails to reach the internet. what should the technician check?

Answers

There are several factors to consider when it comes to this issue.

HT Mode - Incorrect HT Mode settings could be the reason.

Faulty networking drivers - Switch to the most recent version of the networking device driver if the older one is broken or outdated.

Wrong DNS and IP addresses - They may have modified their DNS and IP address settings in the past to address another problem. This could be the root problem.

McAfee antivirus - it is said that this issue will persist, until McAfee is completely uninstalled from PCs.

Follow the link below to see the difference between IPv4 and IPv6

https://brainly.in/question/183077

#SPJ4

Use the function varimp() on the output of train() and save it to an object called:__________

Answers

Use the function varimp() on the output of train() and save it to an object called imp

What is a Function?

This refers to the block of organized code that is used repeatedly to perform some tasks.

Hence, we can see that if we Use the function varimp() on the output of train() and save it to an object called imp.

This is because the function name is "varimp()" and therefore, the location where the output would be saved would be named as imp so it can be accessed faster.

The imp is the menoray location where the data would be saved for future use..

Read more about functions and objects here:

https://brainly.com/question/24450698

#SPJ1

Some database changes will only take effect once the database or database object has been ________.

Answers

Some database changes will only take effect once the database or database object has been “Execute

This information is used to show the objects in the database tools window, and display their DDL during completion. You can update the source code of database objects directly by DDL and submit your changes. The IDE will generate a migration script to verify and then execute it in the database. The migration involves the database transformation from one database to another.

DBMS provides public application programming interfaces and a process of database language SQL to allow applications to be written to interact with and manipulate the database. DDL statements are used to build and modify the structure of your tables and other objects in the database. When you execute DDL statements it takes effect immediately.

You can learn more about database at

https://brainly.com/question/26096799

#SPJ4

What is the output of the following code segment? n = 1; while (n <= 5) cout << n << ' '; n ;

Answers

The output of the code segment n = 1; while (n <= 5) cout << n << ' '; n ; is B) 1 1 1... and on forever.

A text segment is one of the sections of a programme in an object file or in memory that includes executable instructions. It is sometimes referred to as a code segment or simply as text.

Oh, and to answer your question, ". data/. code and data segment/code segment directives" are not significantly different from one another. The only distinction that comes to mind is that with code segment, segments must be closed, whereas with. code, segments need not be closed.

This designates the location in memory where the instruction codes are kept. This section is also fixed. Data values provided to software functions and procedures are stored in the stack segment.

Learn more about code segment:

https://brainly.com/question/25781514

#SPJ4

Interviewing, counseling, and communication in relationships are all considered which type of communication?

Answers

Interviewing, counseling, and communication in relationships are all considered structured communication.

Structured communication can be described as a method that improves interactions between people to allow a better exchange of information.

Structured communication is also favorable for conversations involving more than two individuals. Therefore, this type of conversation can be used by complex organizations and healthcare systems as it organizes ideas more effectively.

Interviewing can be described as verbal question-answer sessions between two or more people. Usually, this interaction is not predetermined and is in a free form.

Counseling can be described as a type of remedy in which a person communicates with the counselor to discuss his difficulties in life.

To learn more about counseling, click here:

https://brainly.com/question/28275050

#SPJ4

A computer screen renders an image by using a grid of red, green, and blue lights.
One set of such lights is known as a(n) ___

Answers

Answer:

RGB

Explanation:

RGB is also the term referring to a type of component video signal used in the video electronics industry. It consists of three signals—red, green, and blue—carried on three separate cables/pins. RGB signal formats are often based on modified versions of the RS-170 and RS-343 standards for monochrome video.

In the expression 25, what is the 2?
0 A. exponent
OB.
power
OC. base
OD. model

Answers

Answer:

C

Explanation:

trust

Key history of computers

Answers

Explanation:

The history of computers starts out about 2000 years ago in Babylonia (Mesopotamia), at the birth of the abacus, a wooden rack holding two horizontal wires with beads strung on them. Blaise Pascal is usually credited for building the first digital computer in 1642.

What are the important points
concerning critical thinking?
(Select all that apply.)

You need to practice the right skills.
You can learn it quickly.
You should use your feelings.
You must evaluate information.
You need to be unbiased and unemotiona
You need to use logic and reason.
You need to be well-spoken.

Answers

The  important points to note concerning critical thinking are:

You must evaluate information.You need to be unbiased and unemotional.You need to use logic and reason.You need to be well-spoken.

What value do critical thinking abilities have?

People that use critical thinking are more able to understand their own objectives, motives, as well as self.

You can alter your circumstances, foster personal development, as well as increase your level of general satisfaction when you can derive knowledge to identify the most crucial components and apply those to your life.

Therefore, based on the above, one can say that the options d, e, f, and g selected are correct.

Learn more about critical thinking from

https://brainly.com/question/25434379
#SPJ1

When transitioning to a customer-management strategy, the ___________ department must finance new programs and technology that will help build learning relationships with customers.

Answers

The department must invest in new initiatives and equipment to support the development of collaborative connections with customers as it makes the switch to a customer-management strategy.

What is CRM?Customer relationship management, a technique used by businesses and other organizations to manage their connections with customers, frequently entails evaluating a large amount of data through data analysis. All communications and relationships between your company's customers are managed using a program called customer relationship management (CRM). The three distinct categories of CRM systems are operational, analytical, and collaborative. Businesses use a variety of techniques, plans, and tools together referred to as customer relationship management (CRM) in order to manage and examine client interactions and data throughout the customer lifecycle (CRM). In order to optimize client retention and boost sales, it is important to improve interactions with customers.

To learn more about CRM, refer to:

https://brainly.com/question/25656282

#SPJ4

You are performing a network risk assessment to develop your disaster recovery plan. which of these are examples of preventative measures? check all that apply.

Answers

Examples of preventative actions on a network risk assessment include:

Using a warning system for power outagesSystem testing while monitoringTesting your knowledge and that of the users Preparedness for emergencies

A network risk assessment analyzes the networks that your business and its staff regularly use. The examination aids in identifying the threats to your sensitive data and crucial systems by using methodologies for risk assessment. Once you are aware of and aware of these risks, you may begin to organize your data according to the importance of the associated risk.

An excellent step you can take to assist the efforts of your expanding organization and help you achieve the objectives you've set is to do a network risk assessment.

Learn more about network risk assessment https://brainly.com/question/28398239

#SPJ4

The purpose of testing a program with different combinations of data is to expose run-time and.

Answers

The goal of testing a schedule with different combinations of data is to tell run-time and errors.

Where is the data on the computer?A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming. Integral, Floating Point, Character, Character String, and Composite types are the five basic kinds of data types that are recognized by the majority of current computer languages. Each broad category also includes several particular subtypes. A datum is a single symbol of data, whereas data is any sequence of one or more symbols. Information is derived from data through interpretation. Data that is represented digitally instead of analogically uses the ones-and-zeros binary number system.

To learn more about computer data, refer to:

https://brainly.com/question/24540334

#SPJ4

What best describes proprietary file format?
A format that is closed but free of cost.
A format that is owned by a person or group.
A format that is not bound by copyright law.
A format that is open and free of cost.

Answers

Answer:

A format that is closed but free of cost.

Answer:

A

✔ free

format is not bound by copyrights, trademarks, patents, or restrictions.

A

✔ proprietary

format is considered to be intellectual property, which means it is owned by an individual or organization.

An open file format

✔ can be free or proprietary

A closed file format

✔ is unpublished

Explanation:

Which system will be safer? Explain your answer.​

Answers

What do you mean by sythem like code or firewall

Which type of evidence is not used by the auditor to obtain an understanding of the design and implementation of internal control?

Answers

The auditor does not use confirmation as a sort of evidence to understand how internal controls were designed and implemented.

All information used by the auditor to draw the findings on which the auditor's opinion is based, whether it came from audit processes or other sources, is referred to as audit evidence. Material that both validates and corroborates management's claims about the financial statements or internal control over financial reporting, as well as information that refutes such claims, make up audit evidence.

The auditor's goal is to organize and carry out the audit in order to gather adequate audit evidence to back up the conclusion made in the auditor's report.

Learn more about auditor https://brainly.com/question/28457117?

#SPJ4

Using the celsius_to_kelvin function as a guide, create a new function, changing the name to kelvin_to_celsius, and modifying the function accordingly. sample output with input: 283.15

Answers

Replace '''Your solution goes here''' with:

def kelvin_to_celsius(value_kelvin):

   value_celsius = 0.0

   value_celsius = value_kelvin - 273.15

   return value_celsius

This line defines the function

def kelvin_to_celsius(value_kelvin):

This line initializes value_celcius to 0.0

   value_celsius = 0.0

This line calculates the equivalent of value_kelvin

   value_celsius = value_kelvin - 273.15

This returns the equivalent value_celsius

   return value_celsius

When the Celsius temperature is unsatisfactory and a large quantity is needed, we do convert C to K. T (K) = T (°C) + 273.15 can be used to convert between the two temperatures using the Celsius to Kelvin formula.

Learn more about  celsius_to_kelvin:

https://brainly.com/question/12827244

#SPJ4

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

Answers

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. The form of computing that the project will be using is grid computing.

In the field of computers, when multiple computing systems are used so that a single task can be achieved, then such a system is referred to as grid computing.

The main purpose of grip computing is to work on a joint task where each computer system is specialized in one way or the other in order to help in the joint or single goal. Hence, the correct option is grid computing.

Other options, such as mobile computing, are not correct as mobile computing is a wireless communication for the transmission of data.

Although a part of your question is missing, you might be referring to this question:

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

A. mobile computing

B. grid computing

C. cloud computing

D. green computing

To learn more about grid computing, click here:

https://brainly.com/question/14511163

#SPJ4

Keyboard shortcut for the following
Undo-
Find-
Cut-
Paste-
Save-
Open-​

Answers

Answer:

undo- ctrl+ z

find- ctrl + F and ctrl G

Cut- ctrl + x

Paste- Crtl + v

Save- Crtl S

Open - Crtl P + Crtl K

Explanation:

Answer:

and

Explanation:

Undo-(Ctrl + Z)

Find-(Ctrl + F)

Cut-(Ctrl + X)

Paste-(Ctrl + V)

Save-(Ctrl + S)

Open-(Ctrl + O)

If you are doing modular division with a divisor of 4, what are the only possible answers?

A. 1 2 3 4
B. 1 2 3
C. 0 1 2 3 4
D. 0 1 2 3

Answers

The answer is C have a great day!

0 1 2 3 4 are the only possible answers. As If you are doing modular division with a divisor of 4. Hence, option C is correct.

What is modular division?

Arithmetic that divides two whole numbers by a predetermined integer, replacing the original values with the remainders. In a modular arithmetic system with a modulus of 5, 3 times 4 = 2.

The modulo operator is represented by the arithmetic operator %. The modulo division operator results in the remainder of an integer division. Syntax: If x and y are integers, the expression: x% y. produces the residual when x is divided by y.

The remainder operator, also known as the modulo operator, returns the remainder of the two numbers. Ask yourself if there is any remainder after dividing two numbers, let's say A and B, where A is the dividend and B is the divisor, using the formula A.

Thus, option C is correct.

For more information about modular division, click here:

https://brainly.com/question/14999586

#SPJ5

What setting in a local dns server allows it to query an isp dns server on behalf of the host? question 30 options:
a. recursive
b. dns
c. ttl caching
d. none of these

Answers

None of these explanations - the correct setting for this operation is Lookup. It is a setting that acts on behalf of the client and queries the ISP.

One of the most important settings on a local DNS server is the "lookup" setting. This setting allows the local DNS server to query an ISP DNS server on behalf of the host. This is a very important setting, because it allows the local DNS server to resolve DNS queries for the host.

Without the lookup setting, the local DNS server would not be able to resolve DNS queries for the host. This would cause the host to be unable to connect to the internet. The lookup setting is a very important setting on a local DNS server.

Learn more on local DNS server here:

https://brainly.com/question/28007022

#SPJ4

In which situation would setting be the most important when posing a subject?
A) if the photograph is taken for a yearbook
B) if the photograph is taken for product placement
C) if the photograph is taken using props
D) if the photograph is taken for an actor’s headshot

Answers

The situation that setting would  be the most important when posing a subject is option C) if the photograph is taken using props.

What use do props serve in photography?

Props are said to be any items that are utilized to enhance and clarify the main subject of a photograph. When taking portrait photos, a prop will make the person stand out.

Additionally, it will let the person wants to who they are. The use of portrait props can be a tool that give creative photography concepts a fictional edge.

Therefore, The situation that setting would  be the most important when posing a subject is option C) if the photograph is taken using props.

Learn more about photograph from

https://brainly.com/question/13600227
#SPJ1

A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.

Answers

An emerging technology manager forecasts technology trends and evaluates and experiments with new technologies.

What is forecasts technology?

A forecast technology is a technology that is sued to forecast reports. This technology is used to estimate things before this is happening. They are used for weather forecasting, money values forecasting, and other things.

They used variables and patterns that are made before time, they focus on before things and check the patterns.

Thus, a manager of emerging technologies analyzes evaluates and tests new technologies.

To learn more about forecasts technology, refer to the link:

https://brainly.com/question/7600224

#SPJ1

Which tab should you click if you want to add a caption for a picture or image in your Word document?

a. file
b. home
c. layout
d. references
e. mailings

Answers

Question:

Which tab should you click if you want to add a caption for a picture or image in your Word document?

Answer:

D. references

Explanation:

When you click references I am pretty sure that there would be an option that says "Insert captions".

I hope it helps you!
~XxBells is a cute girlxX~

#Learn with Brainly

With ________, statistical techniques can identify groups of entities that have similar characteristics

Answers

With cluster analysis, statistical techniques can identify groups of entities that have similar characteristics.

Cluster analysis is based on the idea of grouping the observations such that all members of a group are similar to one another and at the same time they are distinctly different from all members outside of this group. When the data is ready, such that it does not have any missing values, you must decide on what metric is appropriate to capture the similarity between your observations using the features that you have. Then you can use a clustering method to group your observations into clusters based on the similar characteristics they possess.

Clustering analysis is of two types, hard clustering, and soft clustering. The two differ in that in hard clustering each data set has to be placed in not more than one of the total clusters while in soft clustering a data set can be placed in more than one of the total clusters.

To learn more about cluster analysis, click here:

https://brainly.com/question/13504822

#SPJ4

____ software can automate key functions of the purchasing process including creating, reviewing, and approving purchase orders and transmitting these purchase orders electronically to the supplier.

Answers

E-procurement software can automate the major functions of a purchasing process. Key functions offered by the e-procurement software include creating, reviewing, and approving purchase orders as well as transferring these purchase orders to the supplier electronically.

E-procurement software automates the workflow of the purchasing process, thus completely replacing the paper-based process of purchase orders. The key functions that an e-procurement software provides to the organizations to buy goods and services online through the supplier’s system are creating, reviewing, and approving purchase orders; and sending these purchase orders online to the supplier’s software system.

E-procurement software streamlines all parts of the purchase process to acquire goods and services a business needs to run. The e-procurement software enables the organization to obtain products and services within the best possible time at the best possible price.

You can learn more about e-procurement software at

https://brainly.com/question/13165862

#SPJ4

Employees in XYZ Corporation all use the same word processing program. The program they are using is more than five years old. Over the years, a number of improvements have been made to the application. The company has decided to upgrade the software for its employees. Two IT employees will install the upgrade on each employee's computer. They estimate that it will take them an hour to install each upgrade. The company has one hundred employees, so they figure it will take approximately fifty hours to finish installing the upgrades — more than an entire workweek! In the space below, describe how a network would make this task easier.

Answers

For the situation given above, creating a network of computers will save a lot of working hours, and make the task of using the word processing programs much easier.

What is the significance of a computer network?

A computer network can be referred to or considered as the network of multiple interconnected computers in a system where they are used for the purpose of linking one main hub or server to a number of systems, thereby making the tasks controllable by a single system.

Therefore, the significance regarding computer networks has been aforementioned.

Learn more about computer networks here:

https://brainly.com/question/13992507

#SPJ1

Which type of operating system is most likely to require a touchscreen in order to issue commands?

server

GUI

mobile

CLI

Answers

A type of operating system which is most likely to require a touchscreen in order to issue commands is: mobile.

What is an operating system?

In Computer technology, an operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, in order to manage random access memory (RAM), software programs, computer hardware and all user processes.

The types of operating systems.

There are different types of operating systems (OS) used for specific purposes and these are;

Real Time operating system (OS) .Distributed operating system (OS).Single User operating system (OS).Batch operating system (OS)Multitasking/Time Sharing operating system (OS).Multiprocessing operating system (OS).Network operating system (OS).Mobile operating system (OS).

In conclusion, a mobile operating system (OS) is commonly designed and developed with a touchscreen in order to enable end users issue commands.

Read more on operating system here: brainly.com/question/22811693

#SPJ1

Other Questions
As part of the sds 16 categories, handling and storage lists precautions for safe handling and storage, including ______________. solve for y 2x + 4y = -1 HELPJoseph buys a subway pass for $55. Every time he rides the subway, money is deducted from the value of the pass. He rode the subway 5 times and $40 was deducted from the value of the pass. How much was deducted from Joseph's account for each ticket? Write a mathematical expression to represent this situation; then find the answer. If Point B is is the midpoint of line AC how do I dove the correct way to find B? Economics is an inquiry into the nature and causes of the wealth of nation explain this statement Membrane proteins are among the most important proteins biologically because they allow the cells to communicate with their environments. These membrane proteins are responsible for all but which process?. You are the owner of a computer business that makes and sells computer products and services. Your main products are computers and printers, but you also offer services of installation and technical support. Your super-fast computers that include additional CAD drawing software have a cost of $600, whereas the regular updated computers have a cost of $400. The printers are manufactured at a cost of $90. For your sales price, you have a 20% markup on the computers and printers, but no markup on the installation costs. The Allied Company just contacted you and would like you to install a new network of computers and printers in their company. They would like 20 regular computers, 5 super-fast computers and 8 printers. The installation costs will total $2,000. a) What will be the total sales price of all the computers? b) What will be the total sales price of all the printers? c) What is the total sales price of everything, including the $2,000 installation? Who is the antagonist of lochness monster BY PAUL ZINDEL which of the following maps would least likely be used to visualize data samples?(a)cartogram(b)isoline(c)political(d)choropleth(e)dot density 500 g of a radioactive element is decaying exponentially. After 8 days 358 g of the element is left.a. Write a function in the form y = yo ekt giving the number of grams of the element after t days.358 f(t)b. Write the function from part a in the form y=Yo500c. Use the answer from part a to find the half-life of the element.a. The exponential equation in the form y=yoekt is(Round to three decimal places as needed.) Find the eighth term of each geometric sequence. 2/3, 4/9, 8/27 . . . . . Fez loves team sports and gets abundant exercise through team activities. When Fez engages in team activities such as running or passing the ball, what is happening to Fezs muscles?A. They are not stretching, bending, shortening, or lengthening.B. They are maintaining tension with an equal force on all sides.C. They are lengthening to resist a greater force.D. They are producing enough force to lift large weights. You want to join a new pool. Beckett Pool charges a $90 membership fee and $25 per month. Lakota Hills Pool charges a $45 membership fee and $40 per month. After how many months is the total cost the same at both pools? Which age gorup most strongly identifies emerging adulthood with the five characterisitics established. by arnett in 2006? Some neurons release neurotransmitter which affects neighboring cells, as well as themselves. this is an example of what type of signaling? choose any that apply. rewrite each expression by factoring out the coefficient of variable -2x+3 A bag with 8 marbles is shown below. 2 marbles are red and 6 are blue. .5.1 The height AB (hint: Theorem of Pythagoras) Consider: To those who saw him often he seemed almost like two men: one the merrymonarch of the hunt and banquet and procession, the friend of children, the patron ofevery kind of sport; the other the cold, acute observer of the audience chamber or theCouncil, watching vigilantly, weighing arguments, refusing except under the stress ofgreat events to speak his own mind.Winston Churchill, "King Henry VIII," Churchill's History of the English-SpeakingPeoplesDiscuss:I1. Churchill draws attention to the contrasting sides of Henry VIII through detail.How is the impact of this sentence strengthened by the order of the detailspresentation?2. What is Churchill's attitude toward Henry? What specific details reveal thisattitude? what is the valency of elements in the group 'v' of the modern periodic table? what is the reasons for the fact that reactivity of group 'v' elements decrease as we go down in the group?