1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
1 year ago
13

List at least 5 disadvantages caused by computer viruses?​

Computers and Technology
1 answer:
Oliga [24]1 year ago
6 0

The 5 disadvantages caused by computer viruses:

  • A lot of pop-ups.
  • Slow performance.
  • Consistent crashes.
  • Storage space shortage.
  • The issues of Missing files.
<h3>
what are Computer virus?</h3>

A computer virus is known to be a kind a type of computer program that is, if it is executed, tends to double itself by changing other computer programs as well as inserting its own  kind of code.

Note that if the  replication process is said to succeeds, the affected areas are then known to be called "infected" with a computer virus.

Other disadvantages of computer virus are:

  • Unknown login items.
  • Increased network traffic.
  • Browser homepage is altered.

Therefore, The 5 disadvantages caused by computer viruses:

A lot of pop-ups.Slow performance.Consistent crashes.Storage space shortage.
  • The issues of Missing files.

Learn more about computer viruses from

brainly.com/question/8401461

#SPJ1

You might be interested in
Both the USB flash drive and the DVD are data storage devices, but they both have numerous differences. Both can contain insane
o-na [289]
It Is Wonderful Add That A "USB" Can Hold Anything At All But Some Thing's "System's" Need A Specific Format Like The "PlayStation Three" With "FAT32" Format.
6 0
3 years ago
_______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
Damm [24]

Answer: sales promotion

Explanation:

Sales promotion are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often used in conjunction with advertising or personal selling programs.

5 0
3 years ago
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standa
Westkost [7]

Answer:

802.11ac

Explanation:

It is a wireless networking standard.It functions only on 5 Ghz only. 802.11ac has three times the bandwidth of 802.11n hence it can handle more number of users.It has multi-link throughput of 1 gigabit per second.It provides high throughput.It is very useful for environments with high user density.

3 0
3 years ago
The background image does not affect any cell’s format or content. _______
Korvikt [17]
Hmmm...that is true 
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
3 0
3 years ago
Other questions:
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • Utility software is also known as _____​
    11·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • I’m trying to get answers from Brainly and it’s not showing up. I’ve been refreshing the browser, but it’s the same. I’ve never
    10·2 answers
  • Suppose that a system uses 32-bit memory words and its memory is built from 16 1M × 16 RAM chips. How large, in words, is the me
    11·1 answer
  • What are finger nails made of?-
    12·2 answers
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
    6·1 answer
  • Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
    15·1 answer
  • A technology _________ occurs when the ability of a company to operate is impaired because of a hardware, software, or data outa
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!