1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
1 year ago
10

If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin

e which one it is
Computers and Technology
1 answer:
koban [17]1 year ago
5 0

To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

<h3>How can you detect a malware in your computer?</h3>

To Know if You Have Malware in your system, one can dectect it if your system often or suddenly slows down, crashes, or others.

Note that To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

Learn more about Malware from

brainly.com/question/399317

#SPJ1

You might be interested in
In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
Sphinxa [80]

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

5 0
3 years ago
The 3 parts of the CPU are
katrin2010 [14]

Central Processing Unit

Arithmitic Logic Unit

Control Unit


3 0
3 years ago
Read 2 more answers
On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
VladimirAG [237]

In this activity Morgan is preparing the digital files to a printer  on a DTP project.

Explanation:

DTP project is the creation of documents using page layout on a personal computer. The process of printing digital based images directly to variety of media substrates is known as digital processing.

The digital files like PDFs can be sent directly to digital printing press to print on paper, photo paper, fabric and so on.

They have unique fade rates and different sensitives to the various deterioration mechanisms. DTP is used for graphic designers to create documents.

6 0
3 years ago
Read 2 more answers
______ is a certification program that recognizes sustainable building practices and strategies. Question 1 options: A) Brundtla
Pani-rosa [81]

Answer:

(C) LEED

Explanation:

LEED certification is a recognized worldwide as symbol of viability achievement.

(Leadership in Energy and Environmental Design(LEED):- It is the most popular and widely used rating system in the world for green buildings. Available for almost all building project types, including new constructions to interior fit-outs.

8 0
3 years ago
A drink costs 3 dollars. A pizza costs 6 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dr
steposvetlana [31]

I think it's correct

.

.

.

.

.

.

.

.

.

5 0
2 years ago
Other questions:
  • Clip art, by default, is formatted as a(n) ____, which cannot be moved to a precise location on a page.
    14·1 answer
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • What is the best definition of the 7x7 rule for maximizing audience comprehension
    13·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • I love my baby boy and can someone help me with this
    6·1 answer
  • Compared with other PC operating systems, the Linux-based operating systems:
    13·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!