1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
5

Which is the best description of a computer virus?

Computers and Technology
2 answers:
solniwko [45]3 years ago
8 0

Answer:

a program that can damage a computer

Explanation:

MatroZZZ [7]3 years ago
6 0
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
You might be interested in
HELLLLLP ill make you brainiest and ill give u a lot of points if you HELP ME Directions Part One.
Vesnalui [34]
The revised email is shown below: 
E-mail A: Good Day! Is it possible that I will be receiving the training manual this morning because I will be needing it for my next shift. 
E-mail B: A customer has a concern regarding the bill that she paid. In the end, she realized that it was a mistake on her part and she wants to call again tomorrow. 

6 0
3 years ago
Read 2 more answers
When you send an email to your professor, a server holds that email until the professor requests it.
Damm [24]
False. As soon as an email is sent with a subject text, your professor receives it immediately
4 0
3 years ago
Write the getNumGoodReviews method, which returns the number of good reviews for a given product name. A review is considered go
Naya [18.7K]

Answer:

Check the explanation

Explanation:

ProductReview.java

public class ProductReview {

  private String name;

  private String review;

 

  public ProductReview(String name, String review) {

      super();

      this.name = name;

      this.review = review;

  }

  public String getName() {

      return name;

  }

  public String getReview() {

      return review;

  }

 

 

}

ReviewCollector.java

import java.util.ArrayList;

public class ReviewCollector {

  private ArrayList<ProductReview> reviewList;

  private ArrayList<String> productList;

  public ReviewCollector(ArrayList<ProductReview> reviewList, ArrayList<String> productList) {

      super();

      this.reviewList = reviewList;

      this.productList = productList;

  }

  public void addReview(ProductReview prodReview) {

      this.reviewList.add(prodReview);

  }

  public int getNumGoodReviews(String prodName) {

      int count = 0;

      ArrayList<ProductReview> set = new ArrayList<>();

      for (int i = 0; i < reviewList.size(); i++) {

          if (reviewList.get(i).getName().compareToIgnoreCase(prodName) == 0) {

              set.add(reviewList.get(i));

          }

      }

      if(set.size()==0)

          return count;

     

      for (int i = 0; i < set.size(); i++) {

          if (set.get(i).getReview().contains("best")) {

              count++;

          }

      }

      return count;

  }

}

3 0
3 years ago
Why is the ketboard calledQWERTY
Serhud [2]
I believe it is because the arrangement of the first six letters in the top alphabet row of a standard keyboard QWERTY goes way back. The layout was created in 1873 when Christopher Latham Sholes made improvements to his earlier typewriter models in order to design a quicker and more efficient typewriter for E. Remington and Sons.
5 0
3 years ago
Read 2 more answers
Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
ale4655 [162]

Answer:

B is more probable option than C

Explanation:

I think its both B and C

3 0
2 years ago
Other questions:
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • Many companies use software to scan resumes and search for _____________.
    10·1 answer
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • The email program shipped with Microsoft office
    15·1 answer
  • What could be one rule to help your friend to blog safely
    6·2 answers
  • What set operator would you use if you wanted to see all of the Customers and the Employees including any records that may appea
    14·1 answer
  • Add a new row to a table by clicking in the
    10·1 answer
  • An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance departmen
    13·1 answer
  • Please answer.
    9·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!