Briefry explain the history of computer?
The computer was invented by man to help him process data more efficiently. Its evolution started with rudimentary calculating aids (mechanical) devised in the 17th century with improvements being made step by step to arrive at the advanced devices we have today.
Is processed food really food?
it is called processed food because they process it and it is food by the way i am only 8 years old.
Answer:
What's generally known as "processed food" is food that has been chemically processed and made from refined ingredients and artificial substances
What do scientific disciplines all share in common?
"They all share a common purpose, philosophy, and enterprise."
What is the effect of a computer virus?
When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.
Intersting facts about computers?
the first computer filled up a large room and it was a calculator with memory
thanks!!
Charles Babbage invented it but he didn't build it, he tried many times but failed.
What was the name of the Trojan king?
There were many kings during Troy's reign, but the one that ruled during the Trojan War was King Priam.
What was the first computer and what does it look like?
Go to http://inventors.about.com/. Then go to the column on the left-hand side and click 'Find: A to Z Inventors'. There will be an alphabet at the top. Click on 'Z'. Then scroll down till you find Konrad Zuse. Click on the name and it will come up with a page about Konrad Zuse and a picture of the first computer.
I hope you have found what you need!!!!!!!
What does it mean when a guy tries touching you all the time?
It means that he does not respect you. He may like you but the attraction is most often, if not always a purely sexual one. If this attention is unwanted then it is a form of sexual harrassment and should be reported. If you are underage then this is illegal.
What is the penalty for hijacking a plane?
With terror threats from skies looming large in the wake of 9/11 in the US, government is likely to amend the existing anti-hijacking law which would arm it with powers to shoot down a hijacked aircraft and providing for death penalty for hijackers.
You cannot "patent" a webpage.
However, the contents of a web site, those portions that would be considered to have "sufficient originality" would be afforded copyright protection.
The actual coding, in all likelihood, wouldn't qualify.
How does the 4th amendment protect your privacy?
U.S. Const., Amend. IV:
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
Amendment IV forms the basis for the Exclusionary Rule, which, if validly applied, excludes inculpatory evidence from consideration as to the criminal responsibility and therefore criminal liability of a person or entity. That is, it functions to prohibit unlawful searches and seizures, including seizures of the person constituted by the arrest and detention of persons. In this context, the "right to privacy" is the "right to be free of unlawful searches and seizures"--and, of course, it is a very highly-qualified right.
Define and explain the difference between virus worms logic bombs and trogen horses?
Virus=A program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run. Most of the time a system file or a program that you use occasionally.
Logic Bomb=Dormant code added to software and triggered at a predetermined time or by a predetermined event.
Trojan Horse=Does not need a host program to work; rather, it substitutes itself for a legit program. Likely to introduce one or more Viruses into your system. Sometimes called downloaders.
Worm=Program that copies itself throughout a network or the internet without a host program. Creates problems by overloading the network as it replicates. Damaging just by their presence. Overloads memory or hard drive space by replicating repeatedly.
How do you find out if you are on chex systems?
You can use one of these methods to find out if you're listed on ChexSystems:
Non free Chexsystem banks List,Free bad credit gude, Learn how get off chexsystems,Or looking for a pre paid visa card
Don't give up there is a bank out there for you!!!!!
GO TO: http://911chexsystembank.blogspot.com/
How do you remove a virus without formatting?
To remove viruses from a laptop, follow these steps:
Disconnect the laptop from the internet to prevent further infection.
Run a virus scan using your installed anti-virus software. Make sure your anti-virus software is up to date. If you don't have one installed, you can download a reliable and reputable anti-virus software online.
If the anti-virus software detects any viruses, follow its instructions to remove the viruses. Sometimes the software will automatically remove them and other times you may need to manually delete them.
If your anti-virus software is unable to remove the virus, try using an anti-malware software. These types of software can detect and remove malware that anti-virus software may miss.
Enter your laptop into Safe Mode with Networking. This mode should prevent any further infection while troubleshooting. To enter Safe Mode with Networking, restart your computer and continuously tap the F8 key until the Advanced Boot Options menu appears. Select Safe Mode with Networking from the options and press Enter.
Launch the anti-virus or anti-malware software in Safe Mode and perform a full system scan.
If this still doesn't work, you may have to perform a full system restore or reinstall the operating system. Make sure to back up your important files before doing this.
After removing the virus, update your operating system and software regularly to prevent future infections. Also, be wary of downloading or opening suspicious files or links.
If you encounter any issues or if the virus remains after following these steps, you can seek help from a professional.
Explain more about post and pre increment with examples?
main()
{
int b=5;
int c= (b++) + (++b) + (++b) + (++b);
printf("%d",c);
}
Ans: The answer will be 27.
The answer will be 32
In my opinion; A computer virus acts like a program, but when executed, it does malicious tasks automatically in your computer without you knowing. Since it works inside a computer, it's like it breathes on electricity, and thinks with the Artificial Intelligence given by its creator. Without electricity, the virus doesn't breathe its source of life for it to do its purpose. So I could say it is "virtually" alive or something like that.
How do you know if you have malware?
Signs of malware include slow website performance, unexpected redirects, unknown pop-ups, unauthorized changes to your site content, or your site getting blacklisted by Google. A sudden drop in traffic or security warnings in Google Search Console are also strong indicators. Regular malware scans, monitoring tools, and keeping your CMS and plugins updated are essential for early detection and protection. Ignoring these signs can damage both your SEO rankings and user trust.
Viruses are thought to have originated from genetic elements that evolved independently from cellular organisms. They likely emerged as genetic material that escaped from host cells and evolved to become infectious particles capable of replicating within host cells. The exact origins of viruses remain a subject of ongoing research and debate in the scientific community.
Which are programs that pretend to be a useful program but do something malicious on your computer?
Trojan Horses
How do you play PlayStation or PS2 games on a PC?
First of all, yes you CAN play PlayStation games on your PC. There are many emulators (programs that mimic the function of other systems) on the Internets. The most popular one and the one I personally use is epsxe170.
Now, before you get all excited. These are some warnings about emulations. You are only legally allowed to use emulation if you:
1. Own the system that you are emulating (i.e. a ps1, game-boy advance, N64, etc.)
2. Own the game that you are playing on your playing on your PC ( i.e FF tactics, banjo kazooie etc.)
People do play these games anyway but this is just for anyone who cares about such a thing. Click on the related link below for a detailed walk through (with pictures) of how to get and install the PA emulator. Please also keep in mind that you may subject to legal issues if you are caught downloading illegal material off the Internet or found under possession of them, be it hardware or software.
As for PS2 emulation, it is possible. The graphics card is extremely important for getting the best performance. If you can sustain good FPS on games like Crysis, Call of Duty and Oblivion at decent settings, chances are that you'll have more than enough power to play most PS2 games at full speed. The latest mid-range GPUs are always a good choice and will last you a few years down the road.
------------------------------------------------------------------------------------------------
YES.... You can run PS2/3 games and PSP games on your PC or Mac......
Just download the correct VGS version....... This is free you can get it from google....
ENJOY......
You can download from torrent sites also....
Download | Install | And Feel realy 3D Depth of the Sony PS or PSP Games....
But remember configure your graphic card firstly.......
What do you call it when your running more than one program?
That is called multitasking.
That is called multitasking.
That is called multitasking.
That is called multitasking.
How do you make computer virus using c language?
Computer viruses can be written in any programming language, not just C. C would be a common language for a virus to be written in because C is fast, and allows viruses to directly access lower level functions like computer memory. C has also been a very popular language for many programs in the past, so those who decide to write a computer virus would be familiar with that language already.