1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
6

What is the best method to avoid getting spyware on a machine

Computers and Technology
1 answer:
monitta2 years ago
3 0

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

You might be interested in
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type
Kitty [74]

Answer:

A Firmware

Explanation:

A firmware is a hardware device usually ROM (Read Only Memory) containing a program. This program will be responsible for making the device to run and perform its expected functions. examples of devices that use firmware to run are printers, computer peripheral devices, many of the modern consumer electronics, etc. The manufacturer may decide to give an update on the firmware from time-to-time if there is a need.

4 0
3 years ago
In order to create user accounts on a linux system, what command should be utilized?
pychu [463]
Ur name and password for it
5 0
4 years ago
Why is digital data, at the base level in computers, represented in binary? * 10 points 0's and 1's are the easiest numbers to d
Liula [17]

Answer:

The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.  

Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.

The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.

8 0
3 years ago
A text file that contains html tags is called a(n) ____.
zysi [14]
A text file that contains html tags is called HTML document. Hope this helps :)
5 0
3 years ago
Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles
AleksAgata [21]

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

3 0
3 years ago
Other questions:
  • What are two great ways to find clues to locate commands on the ribbon?
    13·1 answer
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • Within program menus, some menu items have an arrow next to them. What will open if you click on that command?
    12·2 answers
  • What action(s) should commanders consider to ensure information sharing with partners of foreign countries?
    5·1 answer
  • If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
    14·1 answer
  • How is a source file different from a "listing file"?
    5·1 answer
  • Bullets in a text box will do which of the following?
    11·1 answer
  • g Given a 5 by 5 matrix of all positive values, write a program to find and display the greatest product of the 2 adjacent value
    12·1 answer
  • What are the different parts of a word processing program?<br><br> I need this ASAP please help!!
    6·1 answer
  • How do i make a comment on brainly?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!