1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
2 years ago
10

If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin

e which one it is
Computers and Technology
1 answer:
koban [17]2 years ago
5 0

To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

<h3>How can you detect a malware in your computer?</h3>

To Know if You Have Malware in your system, one can dectect it if your system often or suddenly slows down, crashes, or others.

Note that To detect it one can only know if:

  • Your web browser freeze or is unresponsive?
  • System is filled with a lot of pop-up messages?
  • Your computer run slower than normal, etc.

Learn more about Malware from

brainly.com/question/399317

#SPJ1

You might be interested in
Complete the sentence. <br><br> The internet is an example of a ______
maria [59]

Answer:

packet switched network

4 0
3 years ago
Getting a haircut from a barber is an example of a service that can be purchased. Please select the best answer from the choices
RUDIKE [14]
The answer would be true.
3 0
3 years ago
Read 2 more answers
Explain how Icd 10 cm codes can help identify a patient’s health conditions?
Oliga [24]
The ICD-10-CM (International Classification of Diseases, Tenth Revision, Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States
6 0
3 years ago
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
Write an algorithm to find perimeter of circle<br>​
Anna11 [10]

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

6 0
3 years ago
Other questions:
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    9·2 answers
  • A list of the slides in a presentation is found here.
    7·2 answers
  • If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
    13·1 answer
  • You can use the Ignore All button to ignore the current and all future occurrences of a flagged word. True or False
    5·1 answer
  • Which of these is a Microsoft certification for system engineers?
    9·1 answer
  • What kind of service is typically not offered by hosting service​
    6·1 answer
  • What application can be used to set windows 8 to boot into safe mode while still in windows?
    15·1 answer
  • Differentiate agricultural waste from hazardous waste.​
    9·1 answer
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • Tape is magnetic tape which sound ca be recorded , true or false?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!