1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
14

Which of the following tasks is least effective at preventing a computer virus?

Computers and Technology
2 answers:
Alex Ar [27]3 years ago
6 0

The correct answer is C. Anti-virus software is set to scan your computer weekly.

Explanation:

In technology, anti-virus software aims at identifying and stopping the actions of viruses that spread in the host and alter normal functioning leading to issues in cybersecurity or damages in the software of a technological device. Additionally, for anti-virus software to be effective, the software needs to be updated, perform routine scans daily or almost daily and scan all elements download. This implies, if the anti-virus software is set to scan your computer weekly this might not prevent a computer virus because a virus can infect your computer and be unnoticed for several days. Thus, the one that is least effective at preventing computer virus is "Anti-virus software is set to scan your computer weekly".

worty [1.4K]3 years ago
3 0
Anti-virus software is set to scan your computer weekly is the least effective.
You might be interested in
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web
11111nata11111 [884]

Answer:

A. Source code

Explanation:

In the field of Programming; Source code is the code written in high level language given to the computer to translate to machine -  executable code before executing. It is usually written and understood by human. It is closer to human like language, as it allows easier expression. It is mostly consist of english-like statement.

So, Erik would primarily be writing source code when performing his daily tasks since his daily task require high level of computer programming and internet knowledge.

5 0
3 years ago
Make a program that prints each line of its input that mentions fred. (It shouldn’t do anything for other lines of input.) Does
Vitek1552 [10]

Answer:

See Explaination

Explanation:

This assume that input is a file and is given on command line. Please note this will ot print lines with frederick as thats what I feel question is asking for

#!/usr/bin/perl -w

open(FILE, $ARGV[0]) or die("Could not open the file $ARGV[0]");

while ($line = <FILE>){

if($line=~/\s+fred\s+/)

{

print $line;

}

}

close(FILE);

8 0
3 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
The question is in the photo
Anastaziya [24]

Answer:

a

the most suitable answer

8 0
3 years ago
Propose a data structure that supports the stack push and pop operations and a third operation findMin, which returns the smalle
juin [17]

Answer: attached below

Explanation:

3 0
3 years ago
Other questions:
  • Select the correct answer.
    6·1 answer
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • The standing toe touch is most likely to result in
    15·1 answer
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • Do you think lossy compression formats will be popular in 20 years? Why or why not?
    10·1 answer
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
  • After Daniel performed poorly on a test, his teacher advised him to do some self-reflection to figure out how he could get a bet
    13·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!