1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
10

All users on the network have antivirus software; however, several users report that they have what an administrator described a

s a "browser redirection virus." How can the users have this virus if they have updated antivirus software installed?
Computers and Technology
1 answer:
nika2105 [10]3 years ago
4 0

Answer:Users on a network can be affected by a ' browser redirection virus' if they open some browser being targeted by which they have subconsciously downloaded some free software called 'freeware' containing the virus on.

Explanation:

'Browser redirection virus" is actually a browser hijacker which may take over some functions like search engines, etc on a  browser used to download some freeware from the internet. It is often referred to as a Potentially Unwanted Program. Various browsers such as Safari, Google Chrome,Internet Explorer, Mozilla Firefox, etc may be targeted by persons with malicious freeware on the internet and while a user may knowingly download the freeware he/she needs, he/she may  have unknowingly downloaded some malware alongside, such as this Browser Redirection Virus. It basically redirects your home page, whenever you open the  browser, to the programmed ones  of  the attacker such as some other search engine, advertising sites, affiliate sites for products marketing, etc.    

The updated antivirus on the user system does not positively detect this as it is not a virus actually but some potentially unwanted program attached to the freeware downloaded from the internet by the user. This Potentially Unwanted Program is uploaded and attached online by some unscrupulous persons basically for some financial gains as it redirects your own page to those of  their own affiliates.

Hope this helps.

You might be interested in
Ally made the net below to find the surface area of a box she was designing. The box measures 12 centimeters long by 9 centimete
jarptica [38.1K]

The area of the box is 972.

7 0
3 years ago
If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?
Sonbull [250]

The transmission that is more efficient is the full duplex transmission.

<h3>What is database?</h3>

A database simply means an organized collection of a structured information in a computer program.

In this case, when a company uses multimedia applications in addition to normal file and database sharing, the efficient transmission is the full duplex transmission.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

3 0
2 years ago
A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
Mama L [17]

Answer:

Replace the printhead is the correct answer.

Explanation:

Because in the following statement, that person is from the department of the accounting then, he call the technician regarding the problem occurs in the printer which is dot-matrix printer and when he examined the dot-matrix printer and replace the printhead because when he print any document then, he finds that some letters have missing from the page.

5 0
3 years ago
Do applications need to exchange udp control messages before exchanging data
Molodets [167]

The answer is NO.

Thats what makes UDP connectionless. Aclient that is going to send a UDP message to the server just sends it.The server does not know it is coming untill it arrives .When a server recieves a UDP message it gets the source address/port and the data.

7 0
3 years ago
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
Other questions:
  • How must you rect to a flashing<br> Yellow traffic light?
    9·1 answer
  • Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method
    9·1 answer
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    8·1 answer
  • Which of the following is not a shared characteristic of new media.
    8·1 answer
  • Computers and Technology:
    14·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • Complete the sentence.<br> Python is a_____<br> level language compared to bytecode.
    7·2 answers
  • To reduce the potential for repetitive stress injury you should use proper?
    6·1 answer
  • A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, the
    11·1 answer
  • What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!