1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
10

You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O

nce installed, what needs to be done to the drive and what do these two task do?
Computers and Technology
1 answer:
olga2289 [7]3 years ago
5 0
You start by transferring you un-used data to the secondary drive.
You might be interested in
Which of the following is a way to sell the network proposal to management?Group of answer choicestalk about upgrades from 10Mbp
Assoli18 [71]
Ethernet is the best in reliability and speed
5 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
*****HELP******
trasher [3.6K]

Answer:

True

Explanation:

The Most Favored Nation (MFN) status and national treatment are provided for in article 4 of the Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement and it is stated that when a member grants favor, advantage, immunity , or privilege to citizens of a country, the country shall grant similar favor, privileges and advantages to the citizens of the other members

Therefore;

<em>True</em> Most Favored Nation (MFN) status and national treatment are also included in the Agreement on Trade-Related Aspects of intellectual Property Rights (TRIPS).

5 0
3 years ago
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to
Sladkaya [172]

Since your computer add new tabs when you are working and the thing to do are:

  • You may manually scan for malware as well.
  • Launch Chrome.
  • Click More. Settings in the top right corner.
  • After clicking Advanced Reset, tidy up. tidy up the PC.
  • Choose Find.
  • Click Delete if you are prompted to remove undesirable software. Your computer might need to be restarted.
<h3>Why do my computer's tabs keep growing?</h3>

The chance exists that some form of malware has been installed on your computer, and this is what is causing the tabs to open randomly. Corrupt Installation: It's also possible that this problem is being brought on by a corrupt Chrome browser installation.

To access the Chrome Settings menu, enter chrome:/settings and press Enter. In the Extensions tab, locate New Tab.

One can still solve the problem by: To access the Chrome Settings menu, enter chrome:/settings into the address bar of Chrome and hit Enter. Click on the trash can icon on the "Extensions" tab of the Chrome Settings menu.

Please look for any further dubious extensions that you do not use or are unsure of their origin and remove them as well.

Learn more about Malware attack from

brainly.com/question/17311729
#SPJ1

5 0
1 year ago
Please answer this question​
Vanyuwa [196]

Explanation:

A. Encryption. (B. Printer

6 0
2 years ago
Other questions:
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    11·2 answers
  • In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator t
    14·1 answer
  • Windows domain policy to disable windows 10 update
    7·1 answer
  • 100 POINTS + BRAINLYEST FOR FIRST PERSON THAT GETS IT RIGHT!!!! While writing a formula, what are some ways to insert a cell ref
    12·2 answers
  • Which is the last step in conducting a URL search?
    14·2 answers
  • Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
    15·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • Please help me. Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a dif
    11·1 answer
  • This is a quick and easy program that will let you practice the basics of the switch statement. You will ask the user to enter a
    6·1 answer
  • The ability to understand a person's needs or intentions in the workplace is demonstrating
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!