1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
2 years ago
9

You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted

the files. which type of virus deletes key antivirus program files?
Computers and Technology
1 answer:
liraira [26]2 years ago
4 0

Retro recently discovered that several key files of your antivirus program have been deleted.

<h3>What is antivirus example?</h3>

New versions of Microsoft Windows even include Windows Defender, which with the latest versions of Windows can defend against computer viruses. Other well-known antivirus programs include Norton antivirus and McAfee, and popular free antivirus programs include Avast and AVG.

<h3>Which antivirus is best for laptop?</h3>

McAfee Antivirus Plus is our top choice for multiple devices because its subscriptions offer protection for every device in the home for a reasonable cost.

To learn more about Antivirus Plus, refer

brainly.com/question/28050091

#SPJ4

You might be interested in
Type the correct answer in the box. Spell all words correctly.
Pepsi [2]

Answer:

the diaphragm

hope it helps

6 0
3 years ago
Read 2 more answers
Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
Arturiano [62]

Answer:

for the 5 segments, the utilization is 3.8%

Explanation:

Given the data in the question;

segment size = 1090 bytes

Receiver window size = 5,718 bytes

Link transmission rate or Bandwidth = 26 Mbps = 26 × 10⁶ bps

propagation delay = 22.1 ms

so,

Round trip time = 2 × propagation delay = 2 × 22.1 ms = 44.2 ms

we determine the total segments;

Total segments = Receiver window size / sender segment or segment size

we substitute

Total segments = 5718 bytes / 1090 bytes

Total segments = 5.24587 ≈ 5

Next is the throughput

Throughput = Segment / Round trip

Throughput = 1090 bytes / 44.2 ms

1byte = 8 bits and 1ms = 10⁻³ s

Throughput = ( 1090 × 8 )bits / ( 44.2 × 10⁻³ )s

Throughput = 8720 bits / ( 44.2 × 10⁻³ s )

Throughput = 197.285 × 10³ bps

Now Utilization will be;

Utilization = Throughput / Bandwidth

we substitute

Utilization = ( 197.285 × 10³ bps ) / ( 26 × 10⁶ bps )

Utilization = 0.0076

Utilization is percentage will be ( 0.0076 × 100)% = 0.76%

∴ Over all utilization for the 5 segments will be;

⇒ 5 × 0.76% = 3.8%

Therefore, for the 5 segments, the utilization is 3.8%

4 0
3 years ago
Why is important to build strong connections
Nana76 [90]
Cause weak ones aren't that strong and can easily break, but a strong connection will last longer and will be harder to break. For example you need to build a connection with your dog or else your dog wont trust you. Basically building a strong connection always you to build the trust stronger.... I think this is the answer you are looking for depending on what connection you are looking for
4 0
3 years ago
Read 2 more answers
A field whose data type is ____ can store text that can be used as a hyperlink address
olya-2409 [2.1K]
A field whose data type is URL address data can store text that can be used as a hyperlink address.
8 0
3 years ago
The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
MrRa [10]
<span>The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and the long run, is called a production function.

Hope I helped ;)
</span>
3 0
3 years ago
Other questions:
  • On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
    10·1 answer
  • Which button would you use to quickly add addresses to a mail merge envelope?
    5·1 answer
  • Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
    10·1 answer
  • Wap-enabled devices require a ________, a special web browser that has all the features of computer-based browsers but is simpli
    11·1 answer
  • Develop a program that will calculate the area and perimeter of a rectangle. The length and width can be given as constant.(LENG
    8·1 answer
  • A two-dimensional array can be viewed as ___________ and _____________.
    10·1 answer
  • This finding maximum number function will keep on going until we reach at the last value
    12·1 answer
  • Which is the correct notation to specify the following inheritance?
    8·1 answer
  • Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
    6·2 answers
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!