1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
10

All users on the network have antivirus software; however, several users report that they have what an administrator described a

s a "browser redirection virus." How can the users have this virus if they have updated antivirus software installed?
Computers and Technology
1 answer:
nika2105 [10]3 years ago
4 0

Answer:Users on a network can be affected by a ' browser redirection virus' if they open some browser being targeted by which they have subconsciously downloaded some free software called 'freeware' containing the virus on.

Explanation:

'Browser redirection virus" is actually a browser hijacker which may take over some functions like search engines, etc on a  browser used to download some freeware from the internet. It is often referred to as a Potentially Unwanted Program. Various browsers such as Safari, Google Chrome,Internet Explorer, Mozilla Firefox, etc may be targeted by persons with malicious freeware on the internet and while a user may knowingly download the freeware he/she needs, he/she may  have unknowingly downloaded some malware alongside, such as this Browser Redirection Virus. It basically redirects your home page, whenever you open the  browser, to the programmed ones  of  the attacker such as some other search engine, advertising sites, affiliate sites for products marketing, etc.    

The updated antivirus on the user system does not positively detect this as it is not a virus actually but some potentially unwanted program attached to the freeware downloaded from the internet by the user. This Potentially Unwanted Program is uploaded and attached online by some unscrupulous persons basically for some financial gains as it redirects your own page to those of  their own affiliates.

Hope this helps.

You might be interested in
(tco 8) when a file is opened in the append mode, the file pointer is positioned
Artyom0805 [142]
At the end of the file, so that additional data is appended while the existing data stays intact.
6 0
3 years ago
Each Google My Business location has a unique ID that applies changes to the right listing.
Soloha48 [4]

Answer:

The correct answer to the following question will be option c. Store Code.

Explanation:

A store code will be the unique ID which can uniquely identify any location of that store.

  • Any random number or name can be the store code.
  • A store code in each Google My Business (GMB) will only be viewable to the person who is managing that locations arround the store.
  • Any costumer doesn't have possibility to see it.

Hence, Option C is the right answer.

6 0
3 years ago
______was developed as an interim management protocol with OSI as the ultimate network management protocol.
RSB [31]

Answer:

Simple Network Management Protocol

Explanation:

Simple Network Management Protocol otherwise referred to as SNMP is a form of computer protocol that is mainly used in obtaining and regulating information relating to connected gadgets. It is practically based on the internet and was originally planned as an interim protocol.

Hence, it can be concluded that the Simple Network Management Protocol was developed as an interim management protocol with OSI as the ultimate network management protocol.

4 0
3 years ago
During the troubleshooting of a pc that will not boot, it is suspected that the problem is with the ram modules. the ram modules
Damm [24]
The modules were somehow disconnected
8 0
3 years ago
Imagine that you work for a company directly related to your major. Your company is preparing for expansion and your boss, Ms. S
shutvik [7]

Answer:

start with what you know

Explanation:

6 0
3 years ago
Other questions:
  • ) The ________ displays a text box and button for users to browse, select, and upload a file. (Points : 3)
    13·1 answer
  • Which of the following statements is false?
    12·1 answer
  • What is the slogan of the sociological school of criticism ?​
    9·1 answer
  • Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
    11·1 answer
  • The area on your screen where you can access the tab and menu options for word is called what?
    8·2 answers
  • True/False: Audio menus can be useful when one's hands and eyes are busy, or to assist vision-impaired users. With audio menus,
    14·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
    12·1 answer
  • To make changes to how UAC operates, you must be logged in as administrator true or false
    6·1 answer
  • I am making a project i have to advertise a product i picked a futureistic car
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!