1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
13

Sometimes a virus will disable a system’s antivirus protection or add exceptions which prevent its being detected. Running an an

tivirus program from __________ would bypass any files designed to protect the virus.
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

A boot-up CD or a USB

Explanation:

You might be interested in
Five uses of the operating system​
Vikki [24]

Answer:

Security – ...

Control over system performance – ...

Job accounting – ...

Error detecting aids – ...

Memory Management – ...

7 0
3 years ago
Read 2 more answers
Why is a class called a factory of objects
zhenek [66]

Explanation:

A class is called an object factory because objects are created from a class. An object is an instance of a class.

4 0
3 years ago
User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all that apply)
Gnesinka [82]

Answer:

A, C, D

Explanation:

User Interface (UI) Design focuses on anticipating what users might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions.

4 0
3 years ago
Read 2 more answers
What is the definition of bug?​
salantis [7]
In what way is it used?
3 0
3 years ago
Hjnjjjhhbbfg66ui998876dch
GalinKa [24]
What is your question? I’ll try my best to help
4 0
3 years ago
Other questions:
  • A url consists of a ____, a domain name, sometimes the path to a specific web page or location in a web page, and the web page n
    11·1 answer
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • NEED HELP NOW 25 POINTS!!!!!!
    15·2 answers
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    9·1 answer
  • Digital printing is not suitable for printing what
    11·1 answer
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • Which factors are involved in search engine optimization​
    10·1 answer
  • What is a trojan horse
    8·2 answers
  • and assuming main memory is initially unloaded, show the page faulting behavior using the following page replacement policies. h
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!