1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
1 year ago
10

If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin

e which one it is
Computers and Technology
1 answer:
koban [17]1 year ago
5 0

To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

<h3>How can you detect a malware in your computer?</h3>

To Know if You Have Malware in your system, one can dectect it if your system often or suddenly slows down, crashes, or others.

Note that To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

Learn more about Malware from

brainly.com/question/399317

#SPJ1

You might be interested in
Illustrate why Sally's slide meets or does not meet professional expectations?
givi [52]

The correct answer to this open question is the following.

Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.

However, trying to be of help, we can comment on the following general terms.

When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.

What Sally can improve about her slides is the following.

She can design a better structure for the presentation to have more congruence.

Sally has to clearly establish the goal or goals for her presentation.

She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.

If she can use more vivid colors instead of pale or dark ones, that would be best.

No paragraphs unless necessary. She better uses bullet points.

Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.

5 0
3 years ago
MORE THAN ONE ANSWER!
borishaifa [10]

Answer:

YES to all the options given.

- Formatting rows and columns is similar to cell formatting.

- You can insert rows and columns into, or delete rows and columns from, a spreadsheet.

- You can hide or show rows and columns in a spreadsheet.

- You can adjust the height of rows and width of columns.

Explanation:

Formatting rows and columns is similar to cell formatting.

Yes, you can apply basically the same formats to columns and rows as you do with cells, like background, bold, text justification, number formats and much more.

You can insert rows and columns into, or delete rows and columns from, a spreadsheet.

Yes, you can easily add or delete rows and columns from a spreadsheet.

You can hide or show rows and columns in a spreadsheet.

Yes, that is common to hide rows or columns to mask some data, then to unhide them.

You can adjust the height of rows and width of columns.

Yes, absolutely, you can also specify to wrap text that is too long to fit in the width of the cells.

6 0
3 years ago
Read 2 more answers
2. Assume that the reference variable r refers to a serializable object. Write code that serializes the object to the file Objec
Dafna11 [192]

Answer:

Carmen Katrit rgrtun fjdidnf cucixizshdbdbdjsisjsdndbdhdhduehebbwwwhwususiussjhsdbd

3 0
2 years ago
The _______ of the story describes the events that takes place as well as the conflict or problem that must be resolved.
Crank

Answer:

The answer is C the plot.

7 0
3 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
Other questions:
  • Unix/linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
    13·1 answer
  • Shortcuts can help you complete spreadsheet tasks more efficiently. True False?
    7·2 answers
  • List and the deference between MS access objects​
    8·1 answer
  • Which of the following keys on a keyboard allows you to select multiple cells located in different parts of your worksheet?
    13·2 answers
  • Write a method called all Less that accepts two arrays of integers and returns true if each element in the first array is less t
    12·1 answer
  • Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
    13·1 answer
  • Plz help me i need it asap
    5·1 answer
  • Help!!!
    8·1 answer
  • How can a robot differentiate between positive or negative product reviews?
    14·1 answer
  • In the following shell scripting extract, the initial values of variables s, c and p are 0, 1, 1 respectively. What will be the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!