1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
10

All users on the network have antivirus software; however, several users report that they have what an administrator described a

s a "browser redirection virus." How can the users have this virus if they have updated antivirus software installed?
Computers and Technology
1 answer:
nika2105 [10]4 years ago
4 0

Answer:Users on a network can be affected by a ' browser redirection virus' if they open some browser being targeted by which they have subconsciously downloaded some free software called 'freeware' containing the virus on.

Explanation:

'Browser redirection virus" is actually a browser hijacker which may take over some functions like search engines, etc on a  browser used to download some freeware from the internet. It is often referred to as a Potentially Unwanted Program. Various browsers such as Safari, Google Chrome,Internet Explorer, Mozilla Firefox, etc may be targeted by persons with malicious freeware on the internet and while a user may knowingly download the freeware he/she needs, he/she may  have unknowingly downloaded some malware alongside, such as this Browser Redirection Virus. It basically redirects your home page, whenever you open the  browser, to the programmed ones  of  the attacker such as some other search engine, advertising sites, affiliate sites for products marketing, etc.    

The updated antivirus on the user system does not positively detect this as it is not a virus actually but some potentially unwanted program attached to the freeware downloaded from the internet by the user. This Potentially Unwanted Program is uploaded and attached online by some unscrupulous persons basically for some financial gains as it redirects your own page to those of  their own affiliates.

Hope this helps.

You might be interested in
What is <br> Warehouse schema.
anyanavicka [17]
A schema is a collection of database objects, including tables, views, indexes, and synonyms.
6 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less
Ad libitum [116K]

Answer:

#include<iostream>//library inclusion

using namespace std;

int main()

{

int userInput;

do//start of do while loop

{

 cout << "Enter a number less than a 100" << endl;

 cin >> userInput;

 if (userInput < 100) //condition

 {

  cout << "YOu entered less than a hundred: " << userInput << endl;

 }

 else

 {

  cout << "your number is greater than 100" << endl;

 }

} while (userInput > 100);//condition for do while

return 0;//termination of int main

}

Explanation:

The program has been commented for you. The do-while loop enters the first loop regardless of the condition. Then after the first iteration, it checks for the condition. If the condition is being met, it will iterate through, again. Otherwise it will break out of the loop and land on the "return 0;" line. Which also happens to be the termination of the program in this case. The if-else condition is used for the user to see when prompted.

6 0
3 years ago
What is the process called when programmers look for and fix errors in code? Analysis Debug Document Error check
Sunny_sXe [5.5K]
It’s Debug. definition: “identify and remove errors from (computer hardware or software)”.
4 0
3 years ago
Read 2 more answers
What is the difference between Notepad and WordPad?is one more adavnced?if so which one or Notepad is the Mac equivalent of Word
Kitty [74]
WordPad is defenitely more advanced.
There is no Mac equivalent.
4 0
4 years ago
Other questions:
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • Although some families have more resources than other families, there is always a limited amount of resources that families have
    15·2 answers
  • During detachment, _____.
    12·2 answers
  • What is the difference between dsl and dial up?
    14·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
    8·1 answer
  • _______________________ variables do not need to be declared inside the function definition body, they get declared when the fun
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!