1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
2 years ago
14

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jack

ie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.


Question:

What happened and what should Jackie do?
Computers and Technology
1 answer:
lyudmila [28]2 years ago
3 0

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

<h3>What is a system hack?</h3>

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

You might be interested in
What version of bluetooth is installed on the yaesu ft-5dr?.
Olin [163]

Answer:

version 4.2

Explanation:

5 0
2 years ago
Which osi layer is responsible for combining bits into bytes and bytes into frames?
Nastasia [14]
If you are breaking the computer down try in software it does change after a while
3 0
3 years ago
How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
Anastasy [175]

Answer:

A. Treaties

Explanation:

Based on the information provided within the question it can be said that in this type of situation where both countries are affected they usually enter into a treaty. This treaty represents an agreement between both countries on how they are going to handle the situation so that both countries get the justice that they want and therefore mutually benefit.

4 0
3 years ago
What are 3 key factors in defining cost on cloud storage
gregori [183]

i'm not sure sorry

I hope someone else can help you with this question

3 0
3 years ago
A start-up employs interns. The following details of interns are stored
Rufina [12.5K]

Answer: See below.

class Intern:

   def __init__(self):

       self.first_name = input("Enter first name: ")

       self.last_name = input("Enter last name: ")

       self.address = input("Enter address: ")

       self.mobile_number = input("Enter mobile number: ")

       self.e_mail = input("Enter e-mail: ")

   def getdata(self):

       print("First name: ", self.first_name)

       print("Last name: ", self.last_name)

       print("Address: ", self.address)

       print("Mobile number: ", self.mobile_number)

       print("E-mail: ", self.e_mail)

   def putdata(self):

       print("First name: ", self.first_name)

       print("Last name: ", self.last_name)

       print("Address: ", self.address)

       print("Mobile number: ", self.mobile_number)

       print("E-mail: ", self.e_mail)

Explanation:

7 0
2 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Do all accounts use the same routing number
    12·1 answer
  • True or False? When shooting OTS shots of two actors / subjects speaking to each other, it is best to place the camera(s) over t
    10·1 answer
  • Is social media and advancement of technology causing our society to become less social?
    13·1 answer
  • Understanding the context of information allows you to apply it to everyday situations as opposed to just___facts like names,dat
    12·1 answer
  • Joshe is a project leader in Tiran technologies. 75 developers and analysts work under his supervision on several projects. Thes
    12·1 answer
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • Define the missing method. use "this" to distinguish the local member from the parameter name.
    11·2 answers
  • In which step is a metaphor used in planning a multimedia presentation
    15·1 answer
  • I am trying to do a python code quiz for school, the basic requirements for the quiz are: the quiz MUST have 10 questions
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!